AbuseIPDB » 64.62.197.92

Check an IP Address, Domain Name, or Subnet

e.g. 3.238.118.27, microsoft.com, or 5.188.10.0/24

64.62.197.92 was found in our database!

This IP was reported 25,386 times. Confidence of Abuse is 100%: ?

100%
ISP The Shadow Server Foundation
Usage Type Data Center/Web Hosting/Transit
Hostname(s) 92.0-24.197.62.64.in-addr.arpa
scan-39a.shadowserver.org
Domain Name shadowserver.org
Country United States of America
City Pleasanton, California

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 64.62.197.92:

This IP address has been reported a total of 25,386 times from 668 distinct sources. 64.62.197.92 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
Anonymous
Honeypot hit.
Port Scan Hacking Exploited Host
stfw
11211/tcp 1801/tcp 37810/udp...
[2023-04-10/06-10]67pkt,37pt.(tcp),12pt.(udp)
Port Scan
MPL
tcp port scan (7 or more attempts)
Port Scan
gerensat
Web App Attack
MPL
tcp/82 (2 or more attempts)
Port Scan
☢MiG☢
UDP probe(s) @ 3702 US
Port Scan
MPL
tcp/25 (3 or more attempts)
Port Scan
Anonymous
Hit honeypot r.
Port Scan Hacking Exploited Host
Anonymous
Tried our host z.
Port Scan Hacking Exploited Host
RAP
2023-06-10 00:13:38 UTC Unauthorized activity to TCP port 25.
Port Scan
ipfyx
Port scanning
Port Scan
Cynar & Cinny
ufw_block_log_banned
Port Scan
Ross Wheatley
Brute-Force Web App Attack
StatsMe
2023-06-09T21:49:19.996489+0300
ET DROP Dshield Block Listed Source group 1
Port Scan Hacking Spoofing Brute-Force
bakunin1848
Firewall IPS Detection on 09-06-2023 at 21:03:04
Port Scan Exploited Host

Showing 1 to 15 of 25386 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com