AbuseIPDB » 41.134.50.27

Enter an IP Address, Domain Name, or Subnet:

e.g.   3.85.143.239, microsoft.com, or 5.188.10.0/24

41.134.50.27 was found in our database!

This IP was reported 37 times. Confidence of Abuse is 39%: ?

39%
ISP Dimension Data (Pty) Ltd - Optinet
Usage Type Data Center/Web Hosting/Transit
Hostname(s) 41-134-50-27.dsl.mweb.co.za
Domain Name dimensiondata.com
Country South Africa
City Cape Town, Western Cape

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location.

IP Abuse Reports for 41.134.50.27:

This IP address has been reported a total of 37 times from 13 distinct sources. 41.134.50.27 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
stfw
445/tcp 445/tcp 445/tcp...
[2019-04-10/05-25]5pkt,1pt.(tcp)
Port Scan
IP Analyzer
Unauthorized connection attempt from IP address 41.134.50.27 on Port 445(SMB)
Port Scan
stfw
445/tcp 445/tcp 445/tcp...
[2019-03-22/05-16]5pkt,1pt.(tcp)
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(05161029)
Port Scan Hacking Brute-Force
stfw
445/tcp 445/tcp 445/tcp...
[2019-03-22/05-10]4pkt,1pt.(tcp)
Port Scan
stfw
445/tcp 445/tcp 445/tcp
[2019-03-22/05-06]3pkt
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(05061503)
Port Scan Hacking Brute-Force
IP Analyzer
Unauthorized connection attempt from IP address 41.134.50.27 on Port 445(SMB)
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(05031116)
Port Scan Hacking Brute-Force
RoboSOC
Honeypot attack, port: 445, PTR: 41-134-50-27.dsl.mweb.co.za.
Hacking
NotACaptcha
Unauthorised access (Apr 26) SRC=41.134.50.27 LEN=40 TTL=243 ID=14004 TCP DPT=445 WINDOW=1024 SYN
Port Scan
Anonymous
Scanning for multiple open ports and possible vulnerable services
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(04230844)
Port Scan Hacking Brute-Force
AWSBot
Port scan attempt detected by AWS-CCS, CTS, India
Port Scan
bc-netops-eng
Attempted bruteforce of NETBIOS (PaloAltoNetworksIngest)
Port Scan Brute-Force

Showing 1 to 15 of 37 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/41.134.50.27