AbuseIPDB » 42.100.20.119

42.100.20.119 was found in our database!

This IP was reported 19 times. Confidence of Abuse is 38%: ?

38%
ISP CHINANET HEILONGJIANG PROVINCE NETWORK
Usage Type Fixed Line ISP
Domain Name chinatelecom.cn
Country China
City Shanghai, Shanghai

IP Abuse Reports for 42.100.20.119:

This IP address has been reported a total of 19 times from 13 distinct sources. 42.100.20.119 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
Largnet SOC
42.100.20.119 triggered Icarus honeypot on port 23. Check us out on github.
Port Scan Hacking
kk_it_man
honey catch
Port Scan
aitenders.com
Port probe: TCP/23
Port Scan
Anonymous
Unauthorized connection attempt on Port 23
Port Scan Hacking Exploited Host
Alexandr Kulkov
42.100.20.119 triggered Icarus honeypot on port 23.
Port Scan Hacking
Kinsei Engineering Inc.
UFW:High-frequency access to non-released SSH or Telnet ports
Port Scan SSH
cybsecaoccol
unauthorized connection or malicious port scan attempted on tcp port - corp
Port Scan Hacking
security.rdmc.fr
Port Scan Attack proto:TCP src:58466 dst:23
Port Scan
MPL
tcp/23 (4 or more attempts)
Port Scan
MPL
tcp/23 (2 or more attempts)
Port Scan
connect.up-rp.fr
1709741279 - 03/06/2024 16:07:59 Host: 42.100.20.119/42.100.20.119 Port: 23 TCP Blocked
Port Scan
RAP
2024-03-06 12:23:35 UTC Unauthorized activity to TCP port 23. Telnet
Port Scan
abuse_IP_reporter
Mar 5 18:36:32 server UFW BLOCK SRC=42.100.20.119 DF PROTO=TCP SPT=58443
Port Scan
RAP
2024-03-05 09:26:55 UTC Unauthorized activity to TCP port 23. Telnet
Port Scan
MPL
tcp/23 (6 or more attempts)
Port Scan

Showing 1 to 15 of 19 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: