AbuseIPDB » 5.42.20.66

5.42.20.66 was found in our database!

This IP was reported 950 times. Confidence of Abuse is 100%: ?

100%
ISP CJSC Kolomna-Sviaz TV
Usage Type Fixed Line ISP
ASN AS39493
Hostname(s) 5-42-20-66.colomna.net
Domain Name golutvin.ru
Country Russian Federation
City Kolomna, Moscow Oblast

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 5.42.20.66:

This IP address has been reported a total of 950 times from 108 distinct sources. 5.42.20.66 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
Anonymous
Unauthorized connection attempt on Port 23
Port Scan Hacking Exploited Host
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
RAP
2025-02-19 08:44:14 UTC Unauthorized activity to TCP port 23. Telnet
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
Largnet SOC
5.42.20.66 triggered Icarus honeypot on port 23. Check us out on github.
Port Scan Hacking
ps-center
BCK-W: TCP-Scanner. Port: 23
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
security.rdmc.fr
IP in Malicious Database
Web App Attack
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force

Showing 1 to 15 of 950 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: