AbuseIPDB » 59.25.230.122

59.25.230.122 was found in our database!

This IP was reported 287 times. Confidence of Abuse is 96%: ?

96%
ISP Korea Telecom
Usage Type Fixed Line ISP
ASN AS4766
Domain Name kt.com
Country Korea (the Republic of)
City Daegu, Daegu

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 59.25.230.122:

This IP address has been reported a total of 287 times from 184 distinct sources. 59.25.230.122 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
ThreatBook.io
2024-12-13 23:44:53 ["uname -a"]
2024-12-13 23:44:59 ["uname -a"]
Brute-Force
NetEye
SSH brute force login attempt
Brute-Force SSH
Hazzard
(sshd) Failed SSH login from 59.25.230.122 (KR/South Korea/Daegu/Dong-gu/-/[redacted])
Brute-Force SSH
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/0
Brute-Force
rtbh.com.tr
list.rtbh.com.tr report: tcp/0
Brute-Force
rtbh.com.tr
list.rtbh.com.tr report: tcp/0
Brute-Force
rtbh.com.tr
list.rtbh.com.tr report: tcp/22
Brute-Force
akasolutions.de
(sshd) Failed SSH login from 59.25.230.122 (KR/South Korea/-)
Brute-Force SSH
linusf
Brute-Force SSH
Anonymous
Brute-Force SSH
nicosqc
Invalid user usr from 59.25.230.122 port 42120
Brute-Force SSH
nicosqc
Invalid user usr from 59.25.230.122 port 42120
Brute-Force SSH
nicosqc
Invalid user usr from 59.25.230.122 port 42120
Brute-Force SSH
nicosqc
Invalid user usr from 59.25.230.122 port 42120
Brute-Force SSH

Showing 1 to 15 of 287 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: