AbuseIPDB » 200.80.229.40
200.80.229.40 was found in our database!
This IP was reported 916 times. Confidence of Abuse is 72%: ?
ISP | MUNICIPALIDAD DE MALVINAS ARGENTINAS |
---|---|
Usage Type | Fixed Line ISP |
ASN | AS19037 |
Hostname(s) |
200.80.229.40.static.techtelnet.net |
Domain Name | ciudadmalvinas.gov.ar |
Country |
![]() |
City | Los Polvorines, Buenos Aires |
IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.
IP Abuse Reports for 200.80.229.40:
This IP address has been reported a total of 916 times from 67 distinct sources. 200.80.229.40 was first reported on , and the most recent report was .
Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
Reporter | IoA Timestamp in UTC | Comment | Categories | |
---|---|---|---|---|
![]() |
[Honey-SG1] 200.80.229.40 triggered Icarus honeypot on port 445.
|
Port Scan Hacking | ||
![]() |
2 port probes: 2x tcp/445 (smb)
[gda] |
Port Scan Hacking | ||
![]() |
ports, 445/24H:1/7D:2
|
Port Scan | ||
![]() |
Port probe to tcp/445 (smb)
[srv127] |
Port Scan Hacking | ||
![]() |
list.rtbh.com.tr report: tcp/445
|
Brute-Force | ||
![]() |
list.rtbh.com.tr report: tcp/445
|
Brute-Force | ||
![]() |
list.rtbh.com.tr report: tcp/445
|
Brute-Force | ||
![]() |
list.rtbh.com.tr report: tcp/445
|
Brute-Force | ||
![]() |
ports, 445/24H:1/7D:2
|
Port Scan | ||
![]() |
Port probe to tcp/445 (smb)
[srv133] |
Port Scan Hacking | ||
![]() |
2025-06-10 17:19:49 UTC Unauthorized activity to TCP port 445. SMB
|
Port Scan | ||
![]() |
ports, 445/24H:1/7D:3
|
Port Scan | ||
![]() |
Port probe to tcp/445 (smb)
[srv124] |
Port Scan Hacking | ||
![]() |
Port probe to tcp/445 (smb)
[srv124] |
Port Scan Hacking | ||
![]() |
Port probe to tcp/445 (smb)
[srv130] |
Port Scan Hacking |
Showing 1 to 15 of 916 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩