AbuseIPDB » 220.132.201.229

Check an IP Address, Domain Name, or Subnet

e.g. 18.205.66.93, microsoft.com, or 5.188.10.0/24

220.132.201.229 was found in our database!

This IP was reported 1,068 times. Confidence of Abuse is 100%: ?

100%
ISP Chunghwa Telecom Co. Ltd.
Usage Type Unknown
Hostname(s) 220-132-201-229.hinet-ip.hinet.net
Domain Name cht.com.tw
Country Taiwan
City Taichung, Taichung

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 220.132.201.229:

This IP address has been reported a total of 1,068 times from 348 distinct sources. 220.132.201.229 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
Thomas Mauer
IP port scan.
Port Scan
Evelyn Herman
Invalid connection from 220.132.201.229
Not allowed when not authorized
Port Scan
Mary Robertson
Hacking/Portscan
Brute-Force
Rose Brian
Spam 220.132.201.229
Port Scan Brute-Force SSH
Marie Garner
TCP port scan (5+ Attempts)
Port Scan SSH
Luke Mankins
Unauthorized access attempts
Port Scan Brute-Force
Emily Bosley
Malicous connection port 3389
Possible brute force
SSH
Melissa Loretta
TCP port scan (5+ Attempts)
Port Scan SSH
Earl Cliff
Blocked by UFW - Port 443
Port Scan SSH
Connie Heaton
Is not allowed to connect @ tcp 1080
Brute-Force SSH
Mark Miner
Reported By Github AbuseIPDB Reporter, failed attempt connection
Port Scan SSH
Block_Steady_Crew
Honeypot snared from 220.132.201.229
Port Scan Web App Attack
balsakup.fr
[ssh] SSH attack
Brute-Force SSH
MPL
tcp/22
Port Scan
ThreatBook.io
ThreatBook Intelligence: Zombie,Spam more details on https://threatbook.io/ip/220.132.201.229
SSH

Showing 1 to 15 of 1068 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com