AbuseIPDB » 220.74.20.51
220.74.20.51 was found in our database!
This IP was reported 21 times. Confidence of Abuse is 0%: ?
ISP | KT Corporation |
---|---|
Usage Type | Unknown |
Domain Name | kt.com |
Country | Korea (the Republic of) |
City | Seongnam, Gyeonggi-do |
IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.
IP Abuse Reports for 220.74.20.51:
This IP address has been reported a total of 21 times from 8 distinct sources. 220.74.20.51 was first reported on , and the most recent report was .
Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.
Reporter | IoA Timestamp in UTC | Comment | Categories | |
---|---|---|---|---|
ipfyx |
Port scanning
|
Port Scan | ||
ipfyx |
Port scanning
|
Port Scan | ||
ipfyx |
Port scanning
|
Port Scan | ||
ipfyx |
Port scanning
|
Port Scan | ||
ipfyx |
Port scanning
|
Port Scan | ||
ipfyx |
Port scanning
|
Port Scan | ||
ipfyx |
Port scanning
|
Port Scan | ||
EGP Abuse Dept |
Unauthorized connection to Telnet port 23
|
Port Scan Hacking | ||
Anonymous |
port scan and connect, tcp 23 (telnet)
|
Port Scan | ||
ATV |
Unsolicited connection attempts to port 37215
|
Port Scan | ||
RoboSOC |
MVPower DVR TV Shell Unauthenticated Command Execution Vulnerability , PTR: PTR record not found
|
IoT Targeted | ||
Anonymous |
Attempted Administrator Privilege Gain. Signatur ET EXPLOIT HackingTrio UA (Hello, World)
|
Hacking | ||
IrisFlower |
Unauthorized connection attempt detected from IP address 220.74.20.51 to port 80 [J]
|
Port Scan Hacking | ||
IrisFlower |
Unauthorized connection attempt detected from IP address 220.74.20.51 to port 23 [J]
|
Port Scan Hacking | ||
IrisFlower |
Unauthorized connection attempt detected from IP address 220.74.20.51 to port 80 [J]
|
Port Scan Hacking |
Showing 1 to 15 of 21 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩