AbuseIPDB » 220.133.248.217

Enter an IP Address, Domain Name, or Subnet:

e.g.   34.200.222.93, microsoft.com, or 5.188.10.0/24

220.133.248.217 was found in our database!

This IP was reported 13 times. Confidence of Abuse is 41%: ?

41%
ISP Chunghwa Telecom Co. Ltd.
Usage Type Unknown
Hostname(s) 220-133-248-217.HINET-IP.hinet.net
Domain Name cht.com.tw
Country Taiwan
City Tainan, Tainan

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location.

IP Abuse Reports for 220.133.248.217:

This IP address has been reported a total of 13 times from 7 distinct sources. 220.133.248.217 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
ad5gb.com
Brute-Force
ChillScanner
<KERBEROS> TCP (SYN) 220.133.248.217:24677 -> port 88, len 44
Port Scan
ChillScanner
<WWW> TCP (SYN) 220.133.248.217:63084 -> port 81, len 40
Port Scan
Anonymous
" "
Port Scan
ChillScanner
<WWW> TCP (SYN) 220.133.248.217:64985 -> port 81, len 44
Port Scan
winscoreonline.com
client sent HTTP%2f1.1 request without hostname %28see RFC2616 section 14.23%29%3a %2f
Brute-Force
RoboSOC
Honeypot attack, port: 81, PTR: 220-133-248-217.HINET-IP.hinet.net.
Hacking
sumnone
Port probing on unauthorized port 88
Bad Web Bot Exploited Host Web App Attack
ChillScanner
<WWW> TCP (SYN) 220.133.248.217:4025 -> port 81, len 44
Port Scan
stfw
88/tcp 81/tcp
[2020-06-07/07-05]2pkt
Port Scan
stfw
81/tcp
[2020-06-07]1pkt
Port Scan
RoboSOC
Honeypot attack, port: 81, PTR: 220-133-248-217.HINET-IP.hinet.net.
Hacking
ChillScanner
<TELNET, SSH> TCP (SYN) 220.133.248.217:57607 -> port 23, len 44
Port Scan SSH

Showing 1 to 13 of 13 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/220.133.248.217