AbuseIPDB » 41.220.113.126

Enter an IP Address, Domain Name, or Subnet:

e.g.   3.227.233.6, microsoft.com, or 5.188.10.0/24

41.220.113.126 was found in our database!

This IP was reported 12 times. Confidence of Abuse is 18%: ?

18%
ISP Chester Hse BS Network
Usage Type Commercial
Hostname(s) mail.kenyanalliance.com
portal.kenyanalliance.com
Domain Name accesskenya.com
Country Kenya
City Athi River, Machakos

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location.

IP Abuse Reports for 41.220.113.126:

This IP address has been reported a total of 12 times from 7 distinct sources. 41.220.113.126 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
Feddar
Brute-Force
Feddar
Brute-Force
Anonymous
port scan and connect, tcp 1433 (ms-sql-s)
Port Scan
Feddar
Brute-Force
Feddar
Brute-Force
Hunter
Port 1433 Scan
Port Scan
Feddar
Brute-Force
Scan
MultiHost/MultiPort Probe, Scan, Hack -
Port Scan Hacking
boehmer.pro
RDP-Bruteforce | Cancer2Ban-Autoban for Windows (see: https://github.com/Zeziroth/Cancer2Ban)
Brute-Force
Tamsweb
Port Scan
Feddar
DATE:, IP:41.220.113.126, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
Brute-Force
Anonymous
blue team, new exploit?¡ !!!!! 445 445 from everywhere!!!!
Brute-Force

Showing 1 to 12 of 12 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/41.220.113.126