AbuseIPDB » 202.129.1.2

Check an IP Address, Domain Name, or Subnet

e.g. 44.192.25.113, microsoft.com, or 5.188.10.0/24

202.129.1.2 was found in our database!

This IP was reported 1,512 times. Confidence of Abuse is 0%: ?

0%
ISP CAT Telecom Public Company Ltd
Usage Type Unknown
Domain Name cattelecom.com
Country Thailand
City Bangkok, Krung Thep Maha Nakhon

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 202.129.1.2:

This IP address has been reported a total of 1,512 times from 400 distinct sources. 202.129.1.2 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
Anonymous
SSH-Attack
SSH
tutugreen
Invalid user [MASKED] from 202.129.1.2 port [MASKED]
Brute-Force SSH
AdrianT
SSH brute force
Brute-Force SSH
MU-star.net
Invalid user testman from 202.129.1.2 port 51892
Port Scan Brute-Force SSH
MU-star.net
Invalid user vinay from 202.129.1.2 port 48472
Port Scan Brute-Force SSH
MU-star.net
Invalid user backup from 202.129.1.2 port 55790
Port Scan Brute-Force SSH
MU-star.net
Invalid user vinay from 202.129.1.2 port 48472
Port Scan Brute-Force SSH
MU-star.net
Invalid user backup from 202.129.1.2 port 55790
Port Scan Brute-Force SSH
MU-star.net
Invalid user testman from 202.129.1.2 port 51892
Port Scan Brute-Force SSH
AdrianT
SSH brute force
Brute-Force SSH
MU-star.net
Invalid user vinay from 202.129.1.2 port 48472
Port Scan Brute-Force SSH
MU-star.net
Invalid user backup from 202.129.1.2 port 55790
Port Scan Brute-Force SSH
MU-star.net
Invalid user testman from 202.129.1.2 port 51892
Port Scan Brute-Force SSH
oolivero45
Brute-Force SSH
ufn.edu.br
Brute-Force SSH

Showing 1 to 15 of 1512 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com