AbuseIPDB » 42.193.45.112

Check an IP Address, Domain Name, or Subnet

e.g. 3.238.180.255, microsoft.com, or 5.188.10.0/24

42.193.45.112 was found in our database!

This IP was reported 228 times. Confidence of Abuse is 68%: ?

68%
ISP Tencent Cloud Computing (Beijing) Co. Ltd.
Usage Type Data Center/Web Hosting/Transit
Domain Name tencent.com
Country China
City Beijing, Beijing

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 42.193.45.112:

This IP address has been reported a total of 228 times from 32 distinct sources. 42.193.45.112 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
sebaro11
Portscan on 2375/TCP blocked by UFW
Port Scan
IP Analyzer
Unauthorized connection attempt from IP address 42.193.45.112 on Port 2376
Port Scan
stfw
6379/tcp 2376/tcp 2375/tcp...
[2022-02-14/04-12]21pkt,3pt.(tcp)
Port Scan
safarservers
Multi Port Scan
Port Scan Hacking
☢MiG☢
TCP probe(s) @ 6379 [CN]
Port Scan
QUADEMU Abuse
Noxious/Nuisible/вредоносный Host.
Port Scan Brute-Force
SE-botlist
Port scan denied
Port Scan
StatsMe
2022-04-11T10:20:59.533156+0300
ET CINS Active Threat Intelligence Poor Reputation IP group 38
Port Scan Hacking Spoofing Brute-Force
SE-botlist
Port scanning [2 denied]
Port Scan
auto_reporter
Unauthorized port sweep
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 42.193.45.112 to port 2375 [J]
Port Scan Hacking
cmanivong
Port Scan
KPS
PortscanM
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 42.193.45.112 to port 2375 [J]
Port Scan Hacking
cyanryaku
ufw_block_log_banned
Port Scan

Showing 1 to 15 of 228 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com