AbuseIPDB » 3.129.148.13

3.129.148.13 was found in our database!

This IP was reported 36 times. Confidence of Abuse is 69%: ?

69%
ISP Amazon Technologies Inc.
Usage Type Data Center/Web Hosting/Transit
ASN AS16509
Hostname(s) ec2-3-129-148-13.us-east-2.compute.amazonaws.com
Domain Name amazon.com
Country United States of America
City Columbus, Ohio

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 3.129.148.13:

This IP address has been reported a total of 36 times from 33 distinct sources. 3.129.148.13 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
rshict
Hacking, Brute-Force, Web App Attack
Hacking Brute-Force Web App Attack
Murazaki
_ 3.129.148.13 - - [26/Mar/2025:16:21:47 +0100] "" 400 0 "-" "-" "-"
...
Hacking
Anonymous
Brute-Force SSH
Anonymous
Port Scan Brute-Force SSH
c y
...
Web App Attack
drewf.ink
[16:38] Port scanning. Port(s) scanned: TCP/3389
Port Scan
nyuuzyou
Port Scan Brute-Force
geeek
Port scanning: 3389 TCP Blocked
Port Scan
Largnet SOC
3.129.148.13 triggered Icarus honeypot on port 3389. Check us out on github.
Port Scan Hacking
Anonymous
Hit honeypot r.
Port Scan Hacking Exploited Host
webnestify
[Webnestify Honeypot - Singapore] Unauthorized connection attempt on port 3389.
Port Scan Hacking Brute-Force
Anonymous
Portscan
Port Scan
BerHav
7: port=888 Binarycommand starting with 0:
Port Scan IoT Targeted
drewf.ink
[16:04] Port scanning. Port(s) scanned: TCP/8088
Port Scan
BerHav
6: port=888 client is trying to connect by TLS, not allowed for this port.
Port Scan IoT Targeted

Showing 1 to 15 of 36 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: