AbuseIPDB » 201.229.34.12

Enter an IP Address, Domain Name, or Subnet:

e.g.   3.234.241.200, microsoft.com, or 5.188.10.0/24

201.229.34.12 was found in our database!

This IP was reported 307 times. Confidence of Abuse is 88%: ?

88%
ISP Setarnet
Usage Type Fixed Line ISP
Hostname(s) 201-229-34-12.static.setardsl.aw
Domain Name setarnet.aw
Country Aruba
City Oranjestad, Aruba

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location.

IP Abuse Reports for 201.229.34.12:

This IP address has been reported a total of 307 times from 38 distinct sources. 201.229.34.12 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
ChillScanner
<SMB> TCP (SYN) 201.229.34.12:57999 -> port 445, len 40
Port Scan
OnemoreAlly
unauthorized connection attempt
Hacking
ChillScanner
<SMSS SQL> TCP (SYN) 201.229.34.12:48369 -> port 1433, len 40
Port Scan SQL Injection
ChillScanner
<SMB> TCP (SYN) 201.229.34.12:48369 -> port 445, len 40
Port Scan
ChillScanner
<SMB> TCP (SYN) 201.229.34.12:48246 -> port 445, len 44
Port Scan
RoboSOC
Honeypot attack, port: 445, PTR: 201-229-34-12.static.setardsl.aw.
Hacking
ChillScanner
<SMB> TCP (SYN) 201.229.34.12:48246 -> port 445, len 44
Port Scan
RoboSOC
Honeypot attack, port: 445, PTR: 201-229-34-12.static.setardsl.aw.
Hacking
iNetWorker
Port Scan
ChillScanner
<SMSS SQL> TCP (SYN) 201.229.34.12:52324 -> port 1433, len 40
Port Scan SQL Injection
Anonymous
" "
Port Scan
RoboSOC
Honeypot attack, port: 445, PTR: 201-229-34-12.static.setardsl.aw.
Hacking
ozisp.com.au
Port Scan Hacking
mertcangokgoz
Port Scan
RoboSOC
Honeypot attack, port: 445, PTR: 201-229-34-12.static.setardsl.aw.
Hacking

Showing 1 to 15 of 307 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/201.229.34.12