AbuseIPDB » 220.133.122.106

Check an IP Address, Domain Name, or Subnet

e.g. 44.200.171.156, microsoft.com, or 5.188.10.0/24

220.133.122.106 was found in our database!

This IP was reported 1,114 times. Confidence of Abuse is 100%: ?

100%
ISP Chunghwa Telecom Co. Ltd.
Usage Type Unknown
Hostname(s) 220-133-122-106.hinet-ip.hinet.net
Domain Name cht.com.tw
Country Taiwan
City Taipei, Taipei

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 220.133.122.106:

This IP address has been reported a total of 1,114 times from 335 distinct sources. 220.133.122.106 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
Steven Babena
220.133.122.106 Recorded Scanning
Port Scan Brute-Force SSH
Stephen Herbert
Blocked by UFW - Port 3306
SSH
Leroy Ruby
Unauthorized Port Scanning @ port 8080
Port Scan SSH
Lauren Foster
Unauthorized Port Scanning @ port 443
SSH
Robert Claire
Global network scanner(zmap) TCP port3306
Abuser 220.133.122.106
Port Scan Brute-Force
Amelia Robert
Abuse Center SSH
Scanned Port 22
Port Scan Brute-Force
Iliana Gran
Blocked by UFW - Port 8080
Port Scan Brute-Force
Brenna Thompson
Attempted from 220.133.122.106
Failed Attempt to get in to server
Brute-Force
Christopher Johnson
Reported By SpamBot
Not allowed connection attempt
Port Scan Brute-Force SSH
Hunter Horton
Unauthorized Connection To 8080
Port Scan Brute-Force
James Jack
Not authorized
SSH
Gertrude Nickels
Not authorized
Port Scan Brute-Force
Jubilantcur
IP port scan.
Port Scan Brute-Force
Karen Morris
Not authorized
SSH
Wesley Diane
Hacking/Portscan
Port Scan SSH

Showing 1 to 15 of 1114 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com