AbuseIPDB » 65.49.1.95

65.49.1.95 was found in our database!

This IP was reported 3,417 times. Confidence of Abuse is 100%: ?

100%
ISP The Shadow Server Foundation
Usage Type Data Center/Web Hosting/Transit
Hostname(s) 95.0-24.1.49.65.in-addr.arpa
Domain Name shadowserver.org
Country United States of America
City Pleasanton, California

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 65.49.1.95:

This IP address has been reported a total of 3,417 times from 199 distinct sources. 65.49.1.95 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp Comment Categories
MPL
tcp/5986
Port Scan
MPL
tcp/5986
Port Scan
ThreatBook.io
ThreatBook Intelligence: Scanner,Spam more details on https://threatbook.io/ip/65.49.1.95
SSH
Cynar & Cinny
ufw_block_log_banned
Port Scan
RAP
2023-11-29 17:09:55 UTC Unauthorized activity to TCP port 22. SSH
SSH
MPL
tcp/636 (2 or more attempts)
Port Scan
RAP
2023-11-29 13:53:14 UTC Unauthorized activity to TCP port 2323. Telnet
Port Scan
IP Analyzer
Unauthorized connection attempt from IP address 65.49.1.95 on Port 9001
Port Scan
MPL
tcp/9200 (2 or more attempts)
Port Scan
MPL
tcp/9200
Port Scan
diegonix
11/29/2023-05:34:49.001946 65.49.1.95 Protocol: 17 ET DROP Dshield Block Listed Source group 1
Hacking
MPL
tcp/9001 (2 or more attempts)
Port Scan
MPL
tcp/2096 (2 or more attempts)
Port Scan
security.rdmc.fr
IP in Malicious Database
Web App Attack
Security_Whaller
Malicious activity detected on Honeypot.
Hacking Brute-Force Web App Attack

Showing 1 to 15 of 3417 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com