AbuseIPDB » 93.123.109.141
93.123.109.141 was found in our database!
This IP was reported 162 times. Confidence of Abuse is 44%: ?
ISP | Nybula LLC |
---|---|
Usage Type | Data Center/Web Hosting/Transit |
Hostname(s) |
93-123-109-141.sarnica.net |
Domain Name | nybula.com |
Country | Netherlands |
City | Amsterdam, North Holland |
IP Abuse Reports for 93.123.109.141:
This IP address has been reported a total of 162 times from 63 distinct sources. 93.123.109.141 was first reported on , and the most recent report was .
Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.
Reporter | IoA Timestamp in UTC | Comment | Categories | |
---|---|---|---|---|
Hamzah Yakub |
Hacking Attempt /wp-content/plugins/apikey/apikey.php
|
Hacking Web App Attack | ||
cmbplf |
300 requests to *.alfa
156 requests to */wp-plain.php |
Brute-Force Bad Web Bot | ||
Swiptly |
Multiple critical ModSecurity events
... |
Web Spam Bad Web Bot | ||
syokadmin |
|
Brute-Force | ||
Anonymous |
Ports: *; Direction: 0; Trigger: CT_LIMIT
|
Brute-Force SSH | ||
Ba-Yu |
General hacking/exploits/scanning
|
Web Spam Hacking Brute-Force Exploited Host Web App Attack | ||
Anonymous |
/wp-content/themes/seotheme/db.php?u
|
Web App Attack | ||
Rizzy |
Multiple WAF Violations
|
Brute-Force Web App Attack | ||
Anonymous |
Infected user bad webscan
|
Exploited Host | ||
Anonymous |
vulnerablilities-scan detected
|
Port Scan Web App Attack | ||
FeG Deutschland |
Looking for CMS/PHP/SQL vulnerablilities - 13
|
Exploited Host Web App Attack | ||
Anonymous |
wordpress-trap; Infected user bad webscan
|
Exploited Host Web App Attack |
Showing 151 to 162 of 162 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩