AbuseIPDB » 18.104.22.168
Check an IP Address, Domain Name, or Subnet
e.g. 22.214.171.124, microsoft.com, or 126.96.36.199/24
188.8.131.52 was found in our database!
This IP was reported 1,866 times. Confidence of Abuse is 100%: ?
|ISP||Default Route LLC|
|Usage Type||Data Center/Web Hosting/Transit|
|Country||United States of America|
IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.
IP Abuse Reports for 184.108.40.206:
This IP address has been reported a total of 1,866 times from 75 distinct sources. 220.127.116.11 was first reported on , and the most recent report was .
Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
ET CINS Active Threat Intelligence Poor Reputation IP group 63
|Port Scan Hacking Spoofing Brute-Force|
<SCAN PORTS> TCP (SYN) 18.104.22.168:31080 -> port 50580, len 44
1606144863 - 11/23/2020 16:21:03 Host: 22.214.171.124/126.96.36.199 Port: 2000 TCP Blocked
srv02 Mass scanning activity detected Target: 7170 ..
|Port Scan Hacking|
<TELNET, SSH> TCP (SYN) 188.8.131.52:58206 -> port 22, len 44
|Port Scan SSH|
Found on Github Combined on 4 lists / proto=6 . srcport=44255 . dstport=8090 . (689)
<DNS> UDP 184.108.40.206:14960 -> port 53, len 72
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
NIDS: Alert - ET CINS Active Threat Intelligence Poor Reputation IP group 63
<KERBEROS> TCP (SYN) 220.127.116.11:51376 -> port 88, len 44
<RDP> TCP (SYN) 18.104.22.168:13230 -> port 3389, len 44
|Port Scan Brute-Force|
2020-11-23 05:37:12 HTTPs access blocked by firewall
|Port Scan Web App Attack|
Brute force attack stopped by firewall
|Web Spam Brute-Force Web App Attack|
Fail2Ban Ban Triggered
Showing 1 to 15 of 1866 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.