AbuseIPDB » 220.171.45.202

220.171.45.202 was found in our database!

This IP was reported 981 times. Confidence of Abuse is 0%: ?

0%
ISP CHINANET xinjiang province network
Usage Type Fixed Line ISP
ASN AS4134
Domain Name xjtelecom.com.cn
Country China
City Shanghai, Shanghai

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 220.171.45.202:

This IP address has been reported a total of 981 times from 93 distinct sources. 220.171.45.202 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
EGP Abuse Dept
Unauthorized connection to MSSQL port 1433
Port Scan Hacking
b4un0
Auto-report from pfSense: Detected suspicious activity.
Brute-Force SSH
Admins@FBN
FW-PortScan: Traffic Blocked srcport=46294 dstport=1433
Port Scan Hacking SQL Injection
diego
Hacking
Anonymous
RdpGuard detected brute-force attempt on MS-SQL
Brute-Force
ps-center
LT: TCP-Scanner. Port: 1433
Port Scan
Alexandr Kulkov
220.171.45.202 triggered Icarus honeypot on port 1433.
Port Scan Hacking
Anonymous
RdpGuard detected brute-force attempt on MS-SQL
Brute-Force
ukrpack.net
MSSQL_Brute-Force
Brute-Force
Grizzlytools
Kingcopy(AI-IDS)RouterOS: Portscanner detected.
Port Scan
ozisp.com.au
Port Scan Hacking
rtbh.com.tr
list.rtbh.com.tr report: tcp/1433
Brute-Force
drewf.ink
[05:57] Port scanning. Port(s) scanned: TCP/1433
Port Scan
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
MPL
tcp/1433
Port Scan

Showing 76 to 90 of 981 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: