AbuseIPDB » 65.49.20.102

65.49.20.102 was found in our database!

This IP was reported 13,418 times. Confidence of Abuse is 100%: ?

100%
ISP The Shadow Server Foundation
Usage Type Data Center/Web Hosting/Transit
Hostname(s) 102.64-26.20.49.65.in-addr.arpa
scan-17i.shadowserver.org
Domain Name shadowserver.org
Country United States of America
City Pleasanton, California

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 65.49.20.102:

This IP address has been reported a total of 13,418 times from 338 distinct sources. 65.49.20.102 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp Comment Categories
MPL
tcp/16993 (2 or more attempts)
Port Scan
ozisp.com.au
Hacking
diego
Events: TCP SYN Discovery or Flooding, Seen 4 times in the last 10800 seconds
DDoS Attack
Admins@FBN
FW-PortScan: Traffic Blocked srcport=34280 dstport=9192
Port Scan
MPL
tcp/7547 (4 or more attempts)
Port Scan
MPL
tcp ports: 447,7547 (4 or more attempts)
Port Scan
security.rdmc.fr
IP in Malicious Database
Web App Attack
bakunin1848
Firewall IPS Detection on 13-04-2024 at 03:44:05
Port Scan Exploited Host
QUADEMU Abuse Dpt
Noxious/Nuisible/вредоносный Host.
Port Scan Exploited Host
MPL
tcp ports: 8040,8013 (5 or more attempts)
Port Scan
RoboSOC
TCP SYN with data , PTR: scan-17i.shadowserver.org.
Hacking
Block_Steady_Crew
Honeypot snared from 65.49.20.102
Port Scan Web App Attack
MPL
tcp ports: 20547,4786 (3 or more attempts)
Port Scan
MPL
tcp ports: 50070,4786 (3 or more attempts)
Port Scan
diego
Events: TCP SYN Discovery or Flooding, Seen 4 times in the last 10800 seconds
DDoS Attack

Showing 1 to 15 of 13418 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com