AbuseIPDB » 62.201.96.142

Check an IP Address, Domain Name, or Subnet

e.g. 3.236.209.138, microsoft.com, or 5.188.10.0/24

62.201.96.142 was found in our database!

This IP was reported 3,077 times. Confidence of Abuse is 100%: ?

100%
ISP Magyar Telekom
Usage Type Unknown
Hostname(s) mail.ttq.hu
Domain Name telekom.hu
Country Hungary
City Budapest, Budapest

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 62.201.96.142:

This IP address has been reported a total of 3,077 times from 528 distinct sources. 62.201.96.142 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
ipcop.net
Malicious activity detected from 62.201.96.142.
Brute-Force
ipcop.net
Malicious activity detected from 62.201.96.142.
Brute-Force
ipcop.net
Malicious activity detected from 62.201.96.142.
Brute-Force
Dario B.
DATE:2023-03-06 06:23:02, IP:62.201.96.142, PORT:ssh SSH brute force auth (sshd-ovh)
Brute-Force SSH
anon333
Brute-Force Exploited Host SSH
Anonymous
Brute-Force SSH
Atma
Port Scan
Port Scan
Anonymous
$f2bV_matches
Brute-Force SSH
web-hosting.pl
(sshd) Failed SSH login from 62.201.96.142 (HU/Hungary/mail.ttq.hu): 5 in the last 3600 secs
Brute-Force SSH
Hirte
SS1: Brutforce ssh Login
Brute-Force
FB_BK
Fail2ban SSH jail - W
Brute-Force SSH
georgengelmann
Brute-Force SSH
Vladimir Vlaxim
Mar 5 01:25:18 c220-vlx sshd[438931]: Invalid user swarupa from 62.201.96.142 port 51546
...
Brute-Force SSH
PulseServers
Invalid user postgres from 62.201.96.142 port 57022
Brute-Force SSH
yvoictra
Mar 4 23:40:47 venus sshd[28682]: Invalid user abakhah from 62.201.96.142 port 47110
...
Brute-Force SSH

Showing 1 to 15 of 3077 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com