AbuseIPDB » 202.164.139.229

Check an IP Address, Domain Name, or Subnet

e.g. 18.206.177.17, microsoft.com, or 5.188.10.0/24

202.164.139.229 was found in our database!

This IP was reported 25 times. Confidence of Abuse is 32%: ?

32%
ISP Asianet is a Cable ISP Providing
Usage Type Fixed Line ISP
Hostname(s) 229.139.164.202.asianet.co.in
Domain Name asianet.co.in
Country India
City Thiruvananthapuram, Kerala

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 202.164.139.229:

This IP address has been reported a total of 25 times from 9 distinct sources. 202.164.139.229 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
IrisFlower
Unauthorized connection attempt detected from IP address 202.164.139.229 to port 1023 [J]
Port Scan Hacking
RoboSOC
Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 202.164.139.229 to port 80 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 202.164.139.229 to port 80 [T]
Port Scan
Anonymous
Port Scan Hacking Bad Web Bot Web App Attack
ChillScanner
2 probe(s) @ 80
Port Scan
ChillScanner
1 probe(s) @ 8443
Port Scan
ChillScanner
<WWW> TCP (SYN) 202.164.139.229:28424 -> port 80, len 60
Port Scan
Joe-Mark
Found on Alienvault / proto=6 . srcport=37803 . dstport=8081 . (1590)
Hacking Brute-Force
FireballDWF
404 NOT FOUND
Web App Attack
Zero Disk
Infected with a version of Mirai Botnet.
Exploited Host IoT Targeted
IrisFlower
Unauthorized connection attempt detected from IP address 202.164.139.229 to port 80 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 202.164.139.229 to port 7574 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 202.164.139.229 to port 8080 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 202.164.139.229 to port 1023 [T]
Port Scan

Showing 1 to 15 of 25 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/202.164.139.229