AbuseIPDB » 2602:80d:1004::39

2602:80d:1004::39 was found in our database!

This IP was reported 97 times. Confidence of Abuse is 57%: ?

57%

Important Note: Public IPv6 addresses may implement the SLAAC privacy extension. With this, the interface identifier is randomly generated. The SLAAC privacy extension also implements a time out, which is configurable, so that the IPv6 interface addresses will be discarded and a new interface identifier is generated.

ISP Censys, Inc.
Usage Type Commercial
ASN AS398722
Hostname(s) scanner-206.hk2.censys-scanner.com
Domain Name censys.com
Country Hong Kong
City Hong Kong

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 2602:80d:1004::39:

This IP address has been reported a total of 97 times from 36 distinct sources. 2602:80d:1004::39 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
seal
This IP was detected by CrowdSec triggering crowdsecurity/http-bad-user-agent
Brute-Force SSH
SCHAPPY
Malicious activity from IP detected: crowdsecurity/http-bad-user-agent.
Bad Web Bot Web App Attack
2000cn.com.au
This IP was detected by CrowdSec triggering crowdsecurity/http-bad-user-agent
Bad Web Bot Web App Attack
WebTejo
Brute-Force SSH
Dennis
Bad Web Bot
securejdprop
Bad Web Bot Web App Attack
Murazaki
2602:80d:1004::39 - - [30/Jun/2025:11:29:24 +0200] "PRI * HTTP/2.0" 500 170 "-" "-" "-"
...
Hacking
Anonymous
SuspiciousC2 Activity detected by FMBAD System 2025-06-28 16:55:10
Hacking Bad Web Bot Web App Attack
Mangelot Hosting
Web App Attack
SpaceHost-Server
Brute-Force Web App Attack
Anonymous
Fail2Ban triggered
Web App Attack
seal
This IP was detected by CrowdSec triggering crowdsecurity/http-bad-user-agent
Brute-Force SSH
Murazaki
2602:80d:1004::39 - - [20/Jun/2025:15:33:57 +0200] "PRI * HTTP/2.0" 500 170 "-" "-" "-"
...
Hacking
seal
This IP was detected by CrowdSec triggering crowdsecurity/http-bad-user-agent
Brute-Force SSH
geot
PRI * HTTP/2.0
Port Scan Hacking

Showing 1 to 15 of 97 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: