AbuseIPDB » 64.62.197.130

Check an IP Address, Domain Name, or Subnet

e.g. 35.168.110.128, microsoft.com, or 5.188.10.0/24

64.62.197.130 was found in our database!

This IP was reported 964 times. Confidence of Abuse is 100%: ?

100%
ISP The Shadow Server Foundation
Usage Type Data Center/Web Hosting/Transit
Hostname(s) 130.0-24.197.62.64.in-addr.arpa
scan-40i.shadowserver.org
Domain Name shadowserver.org
Country United States of America
City Pleasanton, California

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 64.62.197.130:

This IP address has been reported a total of 964 times from 95 distinct sources. 64.62.197.130 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
Sawasdee
SSH break in attempt
...
SSH
StatsMe
2022-08-16T03:07:49.441673+0300
ET DROP Dshield Block Listed Source group 1
Port Scan Hacking Spoofing Brute-Force
stfw
17/udp 2375/tcp 50075/tcp...
[2022-06-17/08-16]32pkt,21pt.(tcp),7pt.(udp)
Port Scan
ChillScanner
1 probe(s) @ TCP(3389)
Port Scan
ad5gb.com
...
Brute-Force
IrisFlower
Unauthorized connection attempt detected from IP address 64.62.197.130 to port 5984 [J]
Port Scan Hacking
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 64.62.197.130 seq 3454579941 at DstPort 5007
Port Scan
StatsMe
2022-08-15T08:03:17.945951+0300
ET DROP Dshield Block Listed Source group 1
Port Scan Hacking Spoofing Brute-Force
wlt-blocker
Illegal port scannings
Port Scan
KPS
PortscanM
Port Scan
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 64.62.197.130 seq 3696199969 at DstPort 8081
Port Scan
StatsMe
2022-08-14T17:47:56.630824+0300
ET DROP Dshield Block Listed Source group 1
Port Scan Hacking Spoofing Brute-Force
stfw
2375/tcp 50075/tcp 20000/tcp...
[2022-06-17/08-14]30pkt,21pt.(tcp),6pt.(udp)
Port Scan
rakkor
Fail2Ban Auto Report - VPN Hacking Attempt
Hacking Brute-Force
ChillScanner
1 probe(s) @ TCP(80)
Port Scan

Showing 1 to 15 of 964 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com