AbuseIPDB » 202.200.144.161

Enter an IP Address, Domain Name, or Subnet:

e.g.   18.205.176.100, microsoft.com, or 5.188.10.0/24

202.200.144.161 was found in our database!

This IP was reported 50 times. Confidence of Abuse is 45%: ?

45%
ISP Xi'an University of Architecture & Technology
Usage Type University/College/School
Hostname(s) 161.144.200.202.in-addr.arpa
Domain Name xauat.edu.cn
Country China
City Xi'an, Shaanxi

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location.

IP Abuse Reports for 202.200.144.161:

This IP address has been reported a total of 50 times from 12 distinct sources. 202.200.144.161 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
stfw
445/tcp 445/tcp 445/tcp...
[2019-06-18/08-14]4pkt,1pt.(tcp)
Port Scan
iNetWorker
firewall-block, port(s): 445/tcp
Port Scan
Anonymous
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
Port Scan Hacking Brute-Force
stfw
445/tcp 445/tcp 445/tcp
[2019-06-18/08-06]3pkt
Port Scan
IP Analyzer
Unauthorized connection attempt from IP address 202.200.144.161 on Port 445(SMB)
Port Scan
TheMadBeaker
Port Scan: TCP/445
Port Scan
TheMadBeaker
Port Scan: TCP/445
Port Scan
TheMadBeaker
Port Scan: TCP/445
Port Scan
etu brutus
19/8/[email protected]:01:01: FAIL: Alarm-Intrusion address from=202.200.144.161
...
Hacking Brute-Force IoT Targeted
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08021029)
Port Scan Hacking Brute-Force
NotACaptcha
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(07271010)
Port Scan Hacking Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(07241135)
Port Scan Hacking Brute-Force
RoboSOC
Honeypot attack, port: 445, PTR: 161.144.200.202.in-addr.arpa.
Hacking
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(07161101)
Port Scan Hacking Brute-Force

Showing 1 to 15 of 50 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/202.200.144.161