AbuseIPDB » 5.183.30.29

5.183.30.29 was found in our database!

This IP was reported 970 times. Confidence of Abuse is 29%: ?

29%
ISP SPB State Unitary Enterprise ATS Smolnogo
Usage Type Fixed Line ISP
Hostname(s) INET-IP-NAT16-29.sats.spb.ru
Domain Name sats.spb.ru
Country Russian Federation
City Saint Petersburg, Sankt-Peterburg

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 5.183.30.29:

This IP address has been reported a total of 970 times from 181 distinct sources. 5.183.30.29 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp Comment Categories
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
Cynar & Cinny
ufw_block_log_Evil_Communist
Port Scan
geeek
Port scanning: 445 TCP Blocked
Port Scan
MPL
tcp/445 (2 or more attempts)
Port Scan
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
Anonymous
Unauthorized connection attempt
Port Scan Hacking Exploited Host
withfallback.com
Attempted SMB login
Brute-Force
Anonymous
Unauthorized connection attempt
Port Scan Hacking Exploited Host
ⓔⓜⓙⓔⓔ
SMB 🖴 Honeypot: connected to port 445 by 5.183.30.29: port 62480
Port Scan
IP Analyzer
Unauthorized connection attempt from IP address 5.183.30.29 on Port 445(SMB)
Port Scan
_ArminS_
SP-Scan 49182:445 detected 2023.12.15 11:34:35
blocked until 2024.02.03 04:37:22
Port Scan
NotACaptcha
Port Scan
Cynar & Cinny
ufw_block_log_Evil_Communist
Port Scan
Daniel Pavlik
Brute force attempt
Brute-Force
ipfyx
Port scanning
Port Scan

Showing 1 to 15 of 970 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com