AbuseIPDB » 5.227.138.49

Check an IP Address, Domain Name, or Subnet

e.g. 34.239.150.57, microsoft.com, or 5.188.10.0/24

5.227.138.49 was found in our database!

This IP was reported 111 times. Confidence of Abuse is 100%: ?

100%
ISP CJS Company Komstar-Regiony
Usage Type Fixed Line ISP
Domain Name nnov.ru
Country Russian Federation
City Nizhniy Novgorod, Nizhegorodskaya oblast'

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 5.227.138.49:

This IP address has been reported a total of 111 times from 30 distinct sources. 5.227.138.49 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
ChillScanner
1 probe(s) @ TCP(23)
Port Scan
andrew.stream
[portscan] tcp/23 [TELNET]
*(RWIN=31059)(04121020)
Port Scan Hacking Brute-Force
Anonymous
Unauthorized Access Attempt: TCP Port 23
Hacking
hermawan
1618203986 - 04/12/2021 12:06:26 Host: 5.227.138.49/5.227.138.49 Port: 26 TCP Blocked
...
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 5.227.138.49 to port 23 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 5.227.138.49 to port 23 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 5.227.138.49 to port 26 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 5.227.138.49 to port 23 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 5.227.138.49 to port 23 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 5.227.138.49 to port 23 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 5.227.138.49 to port 23 [J]
Port Scan Hacking
ChillScanner
1 probe(s) @ TCP(26)
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 5.227.138.49 to port 23 [J]
Port Scan Hacking
m4lwhere
Scanned 1 times in the last 24 hours on port 23
Port Scan
StatsMe
2021-04-11T06:00:18.669698+0300
ET CINS Active Threat Intelligence Poor Reputation IP group 5
Port Scan Hacking Spoofing Brute-Force

Showing 1 to 15 of 111 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/5.227.138.49