AbuseIPDB » 45.147.228.247

Check an IP Address, Domain Name, or Subnet

e.g. 34.229.119.176, microsoft.com, or 5.188.10.0/24

45.147.228.247 was found in our database!

This IP was reported 45 times. Confidence of Abuse is 32%: ?

32%
ISP combahton GmbH
Usage Type Data Center/Web Hosting/Transit
Hostname(s) rdns0.kumingcheng.com
Domain Name combahton.net
Country Germany
City Mauern, Bayern

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 45.147.228.247:

This IP address has been reported a total of 45 times from 28 distinct sources. 45.147.228.247 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
Anonymous
Fuzzing/Looking for credentials files.
Brute-Force Web App Attack
Anonymous
Fuzzing/Looking for credentials files.
Brute-Force Web App Attack
Anonymous
Fuzzing/Looking for credentials files.
Brute-Force Web App Attack
Anonymous
Fuzzing/Looking for credentials files.
Brute-Force Web App Attack
Anonymous
Fuzzing/Looking for credentials files.
Brute-Force Web App Attack
Anonymous
Fuzzing/Looking for credentials files.
Brute-Force Web App Attack
Anonymous
Fuzzing/Looking for credentials files.
Brute-Force Web App Attack
Anonymous
Fuzzing/Looking for credentials files.
Brute-Force Web App Attack
Anonymous
Fuzzing/Looking for credentials files.
Brute-Force Web App Attack
HeliJP
Hacking Web App Attack
Anonymous
Invalid POST request
Hacking
Anonymous
Fuzzing/Looking for credentials files.
Brute-Force Web App Attack
kolya
[05/10/2022 04:14:22] Unauthorized connection attempt to port 80, server 2252f372.
Port Scan
balsakup.fr
[portscan] Port scan
Port Scan
ANTI SCANNER
Scanner : /.env
Web Spam

Showing 1 to 15 of 45 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: