AbuseIPDB » 62.92.89.220
Check an IP Address, Domain Name, or Subnet
e.g. 3.239.119.61, microsoft.com, or 5.188.10.0/24
62.92.89.220 was found in our database!
This IP was reported 1,512 times. Confidence of Abuse is 100%: ?
ISP | Telenor Norge AS |
---|---|
Usage Type | Mobile ISP |
Hostname(s) |
220.89.92.62.static.cust.telenor.com |
Domain Name | telenor.net |
Country |
![]() |
City | Oslo, Oslo |
IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.
IP Abuse Reports for 62.92.89.220:
This IP address has been reported a total of 1,512 times from 287 distinct sources. 62.92.89.220 was first reported on , and the most recent report was .
Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.
Reporter | Date | Comment | Categories | |
---|---|---|---|---|
Anonymous |
postfix sasl authentication failure blocked by fail2ban
... |
Brute-Force | ||
![]() |
2022-12-09 21:26:08 bs SASL PLAIN auth failed: rhost=62.92.89.220...
|
Brute-Force | ||
![]() |
|
Brute-Force | ||
![]() |
|
Brute-Force | ||
![]() |
1 times SMTP brute-force
|
Hacking Brute-Force | ||
Anonymous |
IMAP password guessing
|
Brute-Force | ||
![]() |
(smtpauth) Failed SMTP AUTH login from 62.92.89.220 (NO/Norway/220.89.92.62.static.cust.telenor.com)
|
Brute-Force | ||
![]() |
SMTP auth dictionary attack
|
Brute-Force | ||
![]() |
|
Brute-Force | ||
![]() |
2022-12-08 19:19:58 idz SASL PLAIN auth failed: rhost=62.92.89.220...
|
Brute-Force | ||
![]() |
|
Brute-Force | ||
![]() |
|
Brute-Force | ||
![]() |
Aug 26 04:25:50 auth: Info: passwd-file([email protected],62.92.89.220): unknown user
... |
Web Spam Email Spam Web App Attack | ||
![]() |
Email Auth Brute force attack 1/1 in last day
|
Brute-Force | ||
Anonymous |
|
Hacking Brute-Force |
Showing 106 to 120 of 1512 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩