AbuseIPDB » 52.15.111.240

52.15.111.240 was found in our database!

This IP was reported 8,747 times. Confidence of Abuse is 100%: ?

100%
ISP Amazon Technologies Inc.
Usage Type Data Center/Web Hosting/Transit
Hostname(s) ec2-52-15-111-240.us-east-2.compute.amazonaws.com
Domain Name amazon.com
Country United States of America
City Columbus, Ohio

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 52.15.111.240:

This IP address has been reported a total of 8,747 times from 110 distinct sources. 52.15.111.240 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
deangelys
Honeypot activity: Unauthorized portscan activity of port(s):10013,3168,487,12320,20547
Port Scan
Admins@FBN
FW-PortScan: Traffic Blocked srcport=49619 dstport=10013
Port Scan
polido
Unauthorized connection attempt to port 3168 from 52.15.111.240
Port Scan
McClay
Port Scan
en0
Port Scan
_ArminS_
SP-Scan 38095:10013 detected 2024.05.08 17:04:32
blocked until 2024.06.27 10:07:19
Port Scan
smopdidi
Ports: 10013, 3168; 4 attempts
Port Scan
diego
Events: TCP SYN Discovery or Flooding, Seen 1127 times in the last 10800 seconds
DDoS Attack
oonux.net
RouterOS: Scanning detected TCP 52.15.111.240:45825 > x.x.x.x:3168
Port Scan
Anonymous
Drop from IP address 52.15.111.240 to tcp-port 10013
Port Scan
MPL
tcp/10013 (3 or more attempts)
Port Scan
MPL
tcp ports: 3168,10013 (153 or more attempts)
Port Scan
iNetWorker
trying to access non-authorized port
Port Scan
MPL
tcp/10013
Port Scan
diego
Events: TCP SYN Discovery or Flooding, Seen 21 times in the last 10800 seconds
DDoS Attack

Showing 8731 to 8745 of 8747 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com