AbuseIPDB » 47.238.45.148

47.238.45.148 was found in our database!

This IP was reported 18 times. Confidence of Abuse is 70%: ?

70%
ISP Alibaba Cloud LLC
Usage Type Data Center/Web Hosting/Transit
Domain Name alicloud.com
Country Hong Kong
City Hong Kong, Hong Kong

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 47.238.45.148:

This IP address has been reported a total of 18 times from 16 distinct sources. 47.238.45.148 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
mxpgmbh
Brute-Force SSH
dagasistemas-sl
Brute-Force SSH
_ArminS_
SP-Scan 8349:6379 detected 2024.07.16 06:12:28
blocked until 2024.09.03 23:15:15
Port Scan
sumnone
Port probing on unauthorized port 2222
Port Scan Hacking Exploited Host
drewf.ink
[19:29] Attempted SSH login on port 22 with credentials root:123456
Brute-Force SSH
bescared
Malicious activity detected. Port scan (6379/TCP)..
Port Scan
drewf.ink
[14:06] Port scanning. Port(s) scanned: TCP/8000
Port Scan
Smel
SSH/22 MH Probe, BF, Hack -
Hacking Brute-Force SSH
ThreatBook.io
ThreatBook Intelligence: Dynamic IP more details on http://threatbook.io/ip/47.238.45.148
SSH
MPL
tcp ports: 2222,22 (12 or more attempts)
Port Scan
ISPLtd
Port Scan SSH
Linuxmalwarehuntingnl
Unauthorized connection attempt
Brute-Force
Admins@FBN
FW-PortScan: Traffic Blocked srcport=48920 dstport=22
Port Scan Hacking SSH
Scan
MultiHost/MultiPort Probe, Scan, Hack -
Port Scan Port Scan Hacking Hacking
Aetherweb Ark
*Port Scan* detected from 47.238.45.148 (HK/Hong Kong/-). N in the last X seconds
Port Scan Port Scan

Showing 1 to 15 of 18 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com