AbuseIPDB » 61.238.242.222

Check an IP Address, Domain Name, or Subnet

e.g. 3.238.252.196, microsoft.com, or 5.188.10.0/24

61.238.242.222 was found in our database!

This IP was reported 179 times. Confidence of Abuse is 100%: ?

100%
ISP Hong Kong Broadband Network Ltd
Usage Type Fixed Line ISP
Hostname(s) 061238242222.static.ctinets.com
Domain Name hkbn.com.hk
Country Hong Kong
City Hong Kong, Hong Kong

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 61.238.242.222:

This IP address has been reported a total of 179 times from 80 distinct sources. 61.238.242.222 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
JPPO
Hit port : 85
Port Scan
safarservers
Multi Port Scan
Port Scan Hacking
kolya
[29/07/2022 01:30:36] Unauthorized connection attempt to port 443, server 9a0b801d.
Port Scan
QUADEMU Abuse
Noxious/Nuisible/вредоносный Host.
Port Scan Brute-Force
kolya
[29/07/2022 01:02:24] Unauthorized connection attempt to port 443, server 98ca3b5a.
Port Scan
ChillScanner
1 probe(s) @ TCP(81)
Port Scan
kolya
[24/07/2022 16:06:58] Unauthorized connection attempt to port 443, server 9a0b801d.
Port Scan
QUADEMU Abuse
Noxious/Nuisible/вредоносный Host.
Port Scan Brute-Force
kolya
[24/07/2022 15:38:47] Unauthorized connection attempt to port 443, server 98ca3b5a.
Port Scan
sebaro11
Portscan on 443/TCP blocked by UFW
Port Scan
auto_reporter
Unauthorized port sweep
Port Scan
auto_reporter
Unauthorized port sweep
Port Scan
Emily
Port Scan
QUADEMU Abuse
Noxious/Nuisible/вредоносный Host.
Port Scan Brute-Force
JPPO
Hit port : 8080
Port Scan

Showing 1 to 15 of 179 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com