AbuseIPDB » 85.29.137.56

85.29.137.56 was found in our database!

This IP was reported 1,717 times. Confidence of Abuse is 100%: ?

100%
ISP Kar-Tel LLC
Usage Type Mobile ISP
Domain Name beeline.kz
Country Kazakhstan
City Karagandy, Qaraghandy oblysy

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 85.29.137.56:

This IP address has been reported a total of 1,717 times from 119 distinct sources. 85.29.137.56 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
guldkage
Unauthorized connection attempt detected from IP address 85.29.137.56 to port 1433 (dk-01) [y]
Brute-Force Exploited Host
Anonymous
RdpGuard detected brute-force attempt on MS-SQL
Brute-Force
KPS
PortscanM
Port Scan
Scan
MultiHost/MultiPort Probe, Scan, Hack -
Port Scan Hacking
Anonymous
Drop from IP address 85.29.137.56 to tcp-port 1433
Port Scan
diego
Events: TCP SYN Discovery or Flooding, Seen 8 times in the last 10800 seconds
DDoS Attack
diego
Events: TCP SYN Discovery or Flooding, Seen 8 times in the last 10800 seconds
DDoS Attack
Anonymous
Drop from IP address 85.29.137.56 to tcp-port 1433
Port Scan
iNetWorker
firewall-block, port(s): 1433/tcp
Port Scan
RAP
2024-07-20 09:31:44 UTC Unauthorized activity to TCP port 1433. SQL
Port Scan
RAP
2024-07-20 06:56:25 UTC Unauthorized activity to TCP port 1433. SQL
Port Scan
RAP
2024-07-20 05:23:55 UTC Unauthorized activity to TCP port 1433. SQL
Port Scan
iNetWorker
firewall-block, port(s): 1433/tcp
Port Scan
ozisp.com.au
Port Scan Hacking
Scan
MultiHost/MultiPort Probe, Scan, Hack -
Port Scan Hacking

Showing 1 to 15 of 1717 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com