AbuseIPDB » 220.122.74.147

Check an IP Address, Domain Name, or Subnet

e.g. 3.229.124.74, microsoft.com, or 5.188.10.0/24

220.122.74.147 was found in our database!

This IP was reported 988 times. Confidence of Abuse is 100%: ?

100%
ISP KT Corporation
Usage Type Unknown
Domain Name kt.com
Country Korea (Republic of)
City Seongnam, Gyeonggi-do

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 220.122.74.147:

This IP address has been reported a total of 988 times from 205 distinct sources. 220.122.74.147 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
oilman
IP caught from endlessh tarpit logs
Brute-Force SSH
H41F4
Invalid user admin from 220.122.74.147 port 32880
Brute-Force SSH
bnt
Invalid user admin from 220.122.74.147 port 43443
Brute-Force SSH
bnt
Invalid user admin from 220.122.74.147 port 43443
Brute-Force SSH
SiyCah
Port Scan Hacking Brute-Force SSH
bnt
Invalid user admin from 220.122.74.147 port 43443
Brute-Force SSH
MU-star.net
Invalid user admin from 220.122.74.147 port 53288
Port Scan Brute-Force SSH
MU-star.net
Invalid user admin from 220.122.74.147 port 34223
Port Scan Brute-Force SSH
SiyCah
Port Scan Hacking Brute-Force SSH
H41F4
Invalid user admin from 220.122.74.147 port 32880
Brute-Force SSH
bnt
Invalid user admin from 220.122.74.147 port 43443
Brute-Force SSH
SiyCah
Port Scan Hacking Brute-Force SSH
H41F4
Invalid user admin from 220.122.74.147 port 32880
Brute-Force SSH
bnt
Invalid user admin from 220.122.74.147 port 43443
Brute-Force SSH
Anonymous
Invalid user admin from 220.122.74.147 port 38635
Brute-Force SSH

Showing 1 to 15 of 988 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com