AbuseIPDB » 93.95.246.62

Check an IP Address, Domain Name, or Subnet

e.g. 34.204.185.54, microsoft.com, or 5.188.10.0/24

93.95.246.62 was found in our database!

This IP was reported 55 times. Confidence of Abuse is 100%: ?

100%
ISP Nur Sultan
Usage Type Fixed Line ISP
Domain Name telecom.kz
Country Kazakhstan
City Nur-Sultan, Nur-Sultan

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 93.95.246.62:

This IP address has been reported a total of 55 times from 24 distinct sources. 93.95.246.62 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
el-brujo
Hacking
gbetsis
SMB Server BruteForce Attack
Port Scan Brute-Force
IrisFlower
Unauthorized connection attempt detected from IP address 93.95.246.62 to port 1433 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 93.95.246.62 to port 1433 [T]
Port Scan
StatsMe
ET SCAN Suspicious inbound to MSSQL port 1433
Port Scan
el-brujo
Hacking
ChillScanner
1 probe(s) @ TCP(1433)
Port Scan
ozisp.com.au
Hacking
stfw
445/tcp
[2021-03-24]1pkt
Port Scan
ChillScanner
1 probe(s) @ TCP(445)
Port Scan
NotACaptcha
Unauthorised access (Mar 24) SRC=93.95.246.62 LEN=40 TTL=243 ID=63102 TCP DPT=445 WINDOW=1024 SYN
Port Scan
gjan.info
Auto Detect Rule!
proto TCP (SYN), 93.95.246.62:53190->gjan.info:1433, len 40
Port Scan
Joe-Mark
Found on CINS badguys / proto=6 . srcport=53190 . dstport=445 SMB . (3019)
Hacking Brute-Force
ChillScanner
1 probe(s) @ TCP(445)
Port Scan
ChillScanner
1 probe(s) @ TCP(445)
Port Scan

Showing 1 to 15 of 55 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/93.95.246.62