AbuseIPDB » 222.190.254.130

Check an IP Address, Domain Name, or Subnet

e.g. 18.205.176.39, microsoft.com, or 5.188.10.0/24

222.190.254.130 was found in our database!

This IP was reported 7,104 times. Confidence of Abuse is 100%: ?

100%
ISP ChinaNet Jiangsu Province Network
Usage Type Unknown
Domain Name chinatelecom.com.cn
Country China
City Taizhou, Jiangsu

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 222.190.254.130:

This IP address has been reported a total of 7,104 times from 628 distinct sources. 222.190.254.130 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
MU-star.net
Invalid user test from 222.190.254.130 port 11541
Port Scan Brute-Force SSH
MU-star.net
Invalid user test from 222.190.254.130 port 11541
Port Scan Brute-Force SSH
ghostwarriors
Unauthorized connection attempt detected, SSH Brute-Force
Port Scan Brute-Force SSH
0x00000F
[Cisco-FW] Unauthorized user login on port 22.
Brute-Force SSH
MU-star.net
Invalid user test from 222.190.254.130 port 11541
Port Scan Brute-Force SSH
Finn
Automatic report: Failed SSH login [2]
Brute-Force SSH
lp
Brute-Force SSH
remo
Brute-Force SSH
scatorig
Attepmt to login to QNAP NAS via SSH/SFTP
FTP Brute-Force Brute-Force
Ross Wheatley
invalid user deploy from 222.190.254.130 port 9238 ssh2
Brute-Force SSH
H41F4
Invalid user postgres from 222.190.254.130 port 7925
Brute-Force SSH
Max la Menace
ssh brute force (P)
Brute-Force SSH
Anonymous
Brute-Force SSH
H41F4
Invalid user postgres from 222.190.254.130 port 7925
Brute-Force SSH
H41F4
Invalid user postgres from 222.190.254.130 port 7925
Brute-Force SSH

Showing 1 to 15 of 7104 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com