AbuseIPDB » 80.252.146.222

80.252.146.222 was found in our database!

This IP was reported 181 times. Confidence of Abuse is 49%: ?

49%
ISP FlexNet customers network
Usage Type Fixed Line ISP
ASN AS21453
Domain Name flex.ru
Country Russian Federation
City Noginsk, Moscow Oblast

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 80.252.146.222:

This IP address has been reported a total of 181 times from 32 distinct sources. 80.252.146.222 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
rtbh.com.tr
list.rtbh.com.tr report: tcp/445
Brute-Force
nfsec.pl
Detected: TCP scan on port: 445 with flags: SYN
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/445
Brute-Force
rtbh.com.tr
list.rtbh.com.tr report: tcp/445
Brute-Force
rtbh.com.tr
list.rtbh.com.tr report: tcp/445
Brute-Force
ⓔⓜⓙⓔⓔ
SMB 🖴 Honeypot: connected to port 445 by 80.252.146.222: port 64077
Port Scan
IP Analyzer
Unauthorized connection attempt from IP address 80.252.146.222 on Port 445(SMB)
Port Scan
jk jk
GoPot Honeypot
Port Scan Hacking
ⓔⓜⓙⓔⓔ
SMB 🖴 Honeypot: connected to port 445 by 80.252.146.222: port 52717
Port Scan
IP Analyzer
Unauthorized connection attempt from IP address 80.252.146.222 on Port 445(SMB)
Port Scan
ⓔⓜⓙⓔⓔ
SMB 🖴 Honeypot: connected to port 445 by 80.252.146.222: port 64729
Port Scan
ⓔⓜⓙⓔⓔ
SMB 🖴 Honeypot: connected to port 445 by 80.252.146.222: port 59555
Port Scan
RAP
2024-12-27 03:47:42 UTC Unauthorized activity to TCP port 445. SMB
Port Scan
Study Bitcoin 🤗
Port probe to tcp/445 (smb)
[srv125]
Port Scan Hacking
Scan
MultiHost/MultiPort Probe, Scan, Hack -
Port Scan Hacking

Showing 1 to 15 of 181 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: