AbuseIPDB » 45.155.204.19

Check an IP Address, Domain Name, or Subnet

e.g. 3.238.24.209, microsoft.com, or 5.188.10.0/24

45.155.204.19 was found in our database!

This IP was reported 1,649 times. Confidence of Abuse is 100%: ?

100%
ISP SmartData LLC
Usage Type Data Center/Web Hosting/Transit
Domain Name smartdata.su
Country Russian Federation
City Saint Petersburg, Sankt-Peterburg

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 45.155.204.19:

This IP address has been reported a total of 1,649 times from 60 distinct sources. 45.155.204.19 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
Honzas
Automatic report:01.07.2022 1:48:38. Port:3389
Brute-Force
auto_reporter
Unauthorized port sweep
Port Scan
auto_reporter
Unauthorized port sweep
Port Scan
auto_reporter
Unauthorized port sweep
Port Scan
StatsMe
2022-07-01T02:24:22.951669+0300
ET CINS Active Threat Intelligence Poor Reputation IP group 44
Port Scan Hacking Spoofing Brute-Force
ChillScanner
3 probe(s) @ TCP(3389)
Port Scan
Invisiblemen
Unauthorized connection attempt from IP address 45.155.204.19 on Port 3389(RDP)
Port Scan
kiwi.network
Incessant port scan:
Port Scan Hacking Exploited Host
sebaro11
Portscan on 3389/TCP blocked by UFW
Port Scan
el-brujo
Hacking
ChillScanner
1 probe(s) @ TCP(3389)
Port Scan
el-brujo
07/01/2022-11:37:43.597417 45.155.204.19 Protocol: 6 ET DROP Dshield Block Listed Source group 1
Hacking
bSebring
07/01/2022-07:37:23.950977 45.155.204.19 Protocol: 6 ET SCAN NMAP -sS window 1024
Port Scan
ChillScanner
1 probe(s) @ TCP(3389)
Port Scan
el-brujo
Hacking

Showing 1 to 15 of 1649 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com