AbuseIPDB » 202.70.133.124

202.70.133.124 was found in our database!

This IP was reported 93 times. Confidence of Abuse is 46%: ?

46%
ISP Yayasan Nawala Nusantara
Usage Type Data Center/Web Hosting/Transit
ASN AS140443
Hostname(s) 124.133.70.202.in-addr.herza.id
Domain Name nawala.org
Country Singapore
City Singapore

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 202.70.133.124:

This IP address has been reported a total of 93 times from 48 distinct sources. 202.70.133.124 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
rtbh.com.tr
list.rtbh.com.tr report: tcp/0
Brute-Force
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
zwh
SSH Brute-Force
Brute-Force SSH
Dark0547
[2024-12-14 23:55:01.813820] SSH/22 Unautorized connection. SSH Brute-force.
Hacking Brute-Force SSH IoT Targeted
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
Interceptor_HQ
Inteceptor Intrusion Detector: failed_password on sshd module PID: (3057336)
Brute-Force SSH
Interceptor_HQ
Inteceptor Intrusion Detector: failed_password on sshd module PID: (3057325)
Brute-Force SSH
Interceptor_HQ
Inteceptor Intrusion Detector: failed_password on sshd module PID: (3057314)
Brute-Force SSH
sashan
Port Scan
bret.dk
Brute-Force SSH
Freenex1911
Brute-Force SSH
Anonymous
Brute-Force SSH
Freenex1911
Brute-Force SSH
jani.hu
Hit on SSH honeypot at 2024-12-14 19:29:04 from 202.70.133.124 as user qemu with password qemu
Brute-Force SSH
flixie
Brute-Force SSH

Showing 1 to 15 of 93 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: