AbuseIPDB » 43.249.57.255

Enter an IP Address, Domain Name, or Subnet:

e.g.   18.215.159.156, microsoft.com, or 5.188.10.0/24

43.249.57.255 was found in our database!

This IP was reported 475 times. Confidence of Abuse is 0%: ?

0%
ISP United Information Highway Co. Ltd.
Usage Type Data Center/Web Hosting/Transit
Domain Name uih.co.th
Country Thailand
City Kamphaeng Phet, Kamphaeng Phet

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location. Contact them to update it!

IP Abuse Reports for 43.249.57.255:

This IP address has been reported a total of 475 times from 33 distinct sources. 43.249.57.255 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
andrew.stream
[portscan] tcp/1433 [MsSQL]

*(RWIN=1024)(01221433)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
IP Analyzer
Unauthorized connection attempt from IP address 43.249.57.255 on Port 445(SMB)
Port Scan
gbetsis
SMB Server BruteForce Attack
Port Scan Brute-Force
andrew.stream
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(01190856)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
andrew.stream
[portscan] tcp/1433 [MsSQL]

*(RWIN=1024)(01171026)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
iNetWorker
firewall-block, port(s): 445/tcp
Port Scan
stfw
445/tcp 1433/tcp 445/tcp...
[2018-11-15/2019-01-15]27pkt,2pt.(tcp)
Port Scan
andrew.stream
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(01151054)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
andrew.stream
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(01151054)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
Anonymous
port scan and connect, tcp 1433 (ms-sql-s)
Port Scan
NotACaptcha
Unauthorised access (Jan 14) SRC=43.249.57.255 LEN=40 TTL=243 ID=22376 TCP DPT=1433 WINDOW=1024 SYN
Port Scan
stfw
1433/tcp 445/tcp 1433/tcp...
[2018-11-13/2019-01-13]27pkt,2pt.(tcp)
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(01130928)
Port Scan Hacking Brute-Force
frostfiretulsa
Brute forcing RDP port 3389
Brute-Force
NotACaptcha
Unauthorised access (Jan 10) SRC=43.249.57.255 LEN=40 TTL=242 ID=33482 TCP DPT=1433 WINDOW=1024 SYN
Port Scan

Showing 1 to 15 of 475 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/43.249.57.255