AbuseIPDB » 200.94.22.250

Check an IP Address, Domain Name, or Subnet

e.g. 34.201.11.222, microsoft.com, or 5.188.10.0/24

200.94.22.250 was found in our database!

This IP was reported 67 times. Confidence of Abuse is 100%: ?

100%
ISP Alestra S. de R.L. de C.V.
Usage Type Fixed Line ISP
Hostname(s) static-200-94-22-250.alestra.net.mx
Domain Name alestra.com.mx
Country Mexico
City Tlalnepantla, Morelos

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 200.94.22.250:

This IP address has been reported a total of 67 times from 26 distinct sources. 200.94.22.250 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
Beta
port scan. Port: 445
Port Scan
Beta
port scan. Port: 445
Port Scan
IDS-f81e2829
[node=RO_BUC_8100] SMB/Windows share exploit attempt (snort-inline)
Port Scan Hacking Brute-Force
iNetWorker
firewall-block, port(s): 445/tcp
Port Scan
Smel
MultiHost/MultiPort Probe, Scan, Hack -
Port Scan Hacking
Smel
SIP/5060 Probe, BF, Hack -
Fraud VoIP Hacking Brute-Force
Scan
MultiHost/MultiPort Probe, Scan, Hack -
Port Scan Hacking
Beta
port scan. Port: 445
Port Scan
ChillScanner
1 probe(s) @ 445
Port Scan
etu brutus
21/2/[email protected]:15:57: FAIL: Alarm-Intrusion address from=200.94.22.250
...
Hacking Brute-Force IoT Targeted
Skymote.net
Connection to port tcp/445
Port Scan
gbetsis
SMB Server BruteForce Attack
Port Scan Brute-Force
stfw
445/tcp 445/tcp 445/tcp...
[2021-01-09/02-11]7pkt,1pt.(tcp)
Port Scan
Beta
port scan. Port: 445
Port Scan
nukenet
TCP attack on port 445 triggered by 200.94.22.250 (px001)
Port Scan Hacking

Showing 1 to 15 of 67 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/200.94.22.250