AbuseIPDB » 213.66.39.197
213.66.39.197 was found in our database!
This IP was reported 146 times. Confidence of Abuse is 23%: ?
ISP | Telia Network services |
---|---|
Usage Type | Fixed Line ISP |
Hostname(s) |
213-66-39-197-no600.tbcn.telia.com |
Domain Name | telia.net |
Country | Sweden |
City | Malmo, Skane |
IP Abuse Reports for 213.66.39.197:
This IP address has been reported a total of 146 times from 35 distinct sources. 213.66.39.197 was first reported on , and the most recent report was .
Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.
Reporter | IoA Timestamp in UTC | Comment | Categories | |
---|---|---|---|---|
www.remote24.se |
IDS multiserver
|
Brute-Force | ||
el-brujo |
|
Hacking | ||
jk jk |
GoPot Honeypot 1
|
Hacking Web App Attack | ||
webbfabriken |
|
Web Spam | ||
EGP Abuse Dept |
Unauthorized connection to RDP port 3389
|
Port Scan Hacking | ||
JCB |
[Tue Oct 08 16:56:04 2024] [info] [client 213.66.39.197:49434] AH01382: Request header read timeout
|
Hacking Web App Attack | ||
LRNP |
|
Bad Web Bot Web App Attack | ||
Birdo |
[Birdo Server] SSH-Multi login Attempt
|
Port Scan Brute-Force SSH | ||
RazorServerFR |
1728399126 - 10/08/2024 14:52:06 Host: 213.66.39.197/213.66.39.197 Port: 111 TCP Blocked
|
Port Scan | ||
Anonymous |
Try to connect to Port_Scan_80_tcp
|
Port Scan | ||
www.remote24.se |
IDS multiserver
|
Brute-Force | ||
Take Down Hackers |
Application: RDP - Username: MODA
|
Hacking Brute-Force | ||
georgengelmann |
RDP intrusion attempt from 213-66-39-197-no600.tbcn.telia.com port 58998
|
Hacking | ||
georgengelmann |
RDP intrusion attempt from 213-66-39-197-no600.tbcn.telia.com port 54063
|
Hacking | ||
georgengelmann |
RDP intrusion attempt from 213-66-39-197-no600.tbcn.telia.com port 57341
|
Hacking |
Showing 1 to 15 of 146 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩