AbuseIPDB » 95.9.242.236

Enter an IP Address, Domain Name, or Subnet:

e.g.   18.209.104.7, microsoft.com, or 5.188.10.0/24

95.9.242.236 was found in our database!

This IP was reported 132 times. Confidence of Abuse is 36%: ?

36%
ISP Turk Telekomunikasyon Anonim Sirketi
Usage Type Fixed Line ISP
Hostname(s) 95.9.242.236.static.ttnet.com.tr
Domain Name turktelekom.com.tr
Country Turkey
City Kayseri, Kayseri

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location.

IP Abuse Reports for 95.9.242.236:

This IP address has been reported a total of 132 times from 19 distinct sources. 95.9.242.236 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
stfw
1433/tcp 445/tcp...
[2018-12-05/2019-01-12]18pkt,2pt.(tcp)
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(01121233)
Port Scan Hacking Brute-Force
Namecheap can suck it
Port Scan
andrew.stream
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(01061056)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
stfw
1433/tcp 1433/tcp 445/tcp...
[2018-12-05/2019-01-05]16pkt,2pt.(tcp)
Port Scan
iNetWorker
firewall-block
Port Scan
andrew.stream
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(01041037)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(01032229)
Port Scan Hacking Brute-Force
andrew.stream
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(01031244)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
ortcloud.ch
Honeypot triggered via portsentry
Hacking Brute-Force
IP Analyzer
Unauthorized connection attempt from IP address 95.9.242.236 on Port 445(SMB)
Port Scan
stfw
1433/tcp 445/tcp...
[2018-12-05/29]14pkt,2pt.(tcp)
Port Scan
andrew.stream
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(12291211)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(12282147)
Port Scan Hacking Brute-Force
stfw
1433/tcp 445/tcp...
[2018-12-05/27]12pkt,2pt.(tcp)
Port Scan

Showing 106 to 120 of 132 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/95.9.242.236?page=8