AbuseIPDB » 65.49.20.72
Check an IP Address, Domain Name, or Subnet
e.g. 3.238.180.255, microsoft.com, or 5.188.10.0/24
65.49.20.72 was found in our database!
This IP was reported 2,125 times. Confidence of Abuse is 100%: ?
ISP | The Shadow Server Foundation |
---|---|
Usage Type | Data Center/Web Hosting/Transit |
Hostname(s) |
72.64-26.20.49.65.in-addr.arpa scan-19a.shadowserver.org |
Domain Name | shadowserver.org |
Country |
![]() |
City | Pleasanton, California |
IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.
IP Abuse Reports for 65.49.20.72:
This IP address has been reported a total of 2,125 times from 124 distinct sources. 65.49.20.72 was first reported on , and the most recent report was .
Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
Reporter | Date | Comment | Categories | |
---|---|---|---|---|
![]() |
Unauthorized connection attempt detected from IP address 65.49.20.72 to port 7443 [J]
|
Port Scan Hacking | ||
![]() |
Noxious/Nuisible/вредоносный Host.
|
Port Scan Brute-Force | ||
![]() |
Unauthorized connection attempt detected from IP address 65.49.20.72 to port 4117 [J]
|
Port Scan Hacking | ||
![]() |
Unauthorized connection attempt detected from IP address 65.49.20.72 to port 4117 [J]
|
Port Scan Hacking | ||
![]() |
[Neko CA] Unauthorized TCP SYN Packet from 65.49.20.72 seq 3150407492 at DstPort 25
|
Port Scan | ||
![]() |
2022-05-17T14:43:26.778028+0300
ET CINS Active Threat Intelligence Poor Reputation IP group 75 |
Port Scan Hacking Spoofing Brute-Force | ||
![]() |
C1-W: TCP-Scanner. Port: 22
|
Port Scan | ||
![]() |
Unauthorized connection attempt detected from IP address 65.49.20.72 to port 7443 [J]
|
Port Scan Hacking | ||
![]() |
2 probe(s) @ TCP(25,8080)
|
Port Scan | ||
Anonymous |
TCP/8080 probe
|
Port Scan | ||
![]() |
Unauthorized connection attempt detected from IP address 65.49.20.72 to port 5443 [J]
|
Port Scan Hacking | ||
![]() |
Automatic report:16.05.2022 5:53:15. Port:137
|
Port Scan Hacking | ||
![]() |
[Neko CA] Unauthorized TCP SYN Packet from 65.49.20.72 seq 2261153355 at DstPort 9200
|
Port Scan | ||
![]() |
ufw_block_log_banned
|
Port Scan | ||
![]() |
Suspicious behaviour detected (tcp/80)
|
Port Scan Hacking Brute-Force |
Showing 1 to 15 of 2125 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩