AbuseIPDB » 42.230.229.72

Check an IP Address, Domain Name, or Subnet

e.g. 44.192.114.32, microsoft.com, or 5.188.10.0/24

42.230.229.72 was found in our database!

This IP was reported 10 times. Confidence of Abuse is 29%: ?

29%
ISP China Unicom Henan Province Network
Usage Type Unknown
Hostname(s) hn.kd.ny.adsl
Domain Name chinaunicom.com
Country China
City Xinyang, Henan

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 42.230.229.72:

This IP address has been reported a total of 10 times from 5 distinct sources. 42.230.229.72 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
IrisFlower
Unauthorized connection attempt detected from IP address 42.230.229.72 to port 23 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 42.230.229.72 to port 23 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 42.230.229.72 to port 82 [J]
Port Scan Hacking
alliance
29.05.2022 03:13:39 Connection to port 23 blocked by firewall
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 42.230.229.72 to port 23 [J]
Port Scan Hacking
kk_it_man
honey catch
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 42.230.229.72 to port 23 [J]
Port Scan Hacking
spheres.li
42.230.229.72 triggered Spheres LU honeypot on port 23.
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 42.230.229.72 to port 80 [J]
Port Scan Hacking
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 42.230.229.72 seq 2503504564 at DstPort 90
Port Scan

Showing 1 to 10 of 10 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com