Enter an IP Address, Domain Name, or Subnet:

e.g.   54.236.234.60, microsoft.com, or 5.188.10.0/23


User Porridge, the webmaster of pukka-j.com, joined AbuseIPDB in September 2016 and has reported 24,860 IPs total.

10,000+ REPORTS ACTIVE USER
IP Date Comment Categories
217.197.39.144
217.197.39.144 - - [18/Dec/2018:21:13:56 +0000] "GET / HTTP/1.0" 301 518 "-" "-"
Port Scan Exploited Host
137.116.207.14
Brute-Force SSH
36.230.77.110
Dec 18 21:09:23 SRC=36.230.77.110 DPT=8080
Port Scan
42.117.241.117
Dec 18 20:28:17 SRC=42.117.241.117 DPT=8080
Port Scan
79.139.112.32
Dec 18 20:57:51 server postfix/smtpd[31544]: connect from unknown[79.139.112.32]
Email Spam Port Scan
104.248.74.178
Dec 18 20:58:01 SRC=104.248.74.178 DPT=22
SSH
218.92.1.141
Dec 18 20:53:50 SRC=218.92.1.141 DPT=22
Brute-Force SSH
104.248.188.192
Brute-Force SSH
187.62.205.138
Brute-Force SSH
194.55.142.45
Port Scan
138.68.18.232
Brute-Force SSH
37.59.119.206
Brute-Force SSH
222.244.139.203
Brute-Force SSH
31.44.75.121
root ssh:notty 31.44.75.121 Tue Dec 18 20:02
Brute-Force SSH
70.120.180.176
pi ssh:notty cpe-70-120-180-176.elp.res.rr.com Tue Dec 18 18:20
4 x pi
Brute-Force Exploited Host SSH
95.213.143.138
atlbitbucket ssh:notty 95.213.143.138 Tue Dec 18 20:42
x 2
Brute-Force SSH
170.150.49.114
Port Scan Exploited Host
185.52.1.9
Brute-Force SSH
190.10.8.67
Brute-Force SSH
142.93.226.53
142.93.226.53 - - [18/Dec/2018:17:38:10 +0000] "\x17\x00j\x00j...……….
Web App Attack
190.153.249.99
Brute-Force SSH
103.6.157.8
Brute-Force SSH
190.85.234.215
Brute-Force SSH
177.23.90.10
Brute-Force SSH
94.237.53.154
acct ssh:notty 94-237-53-154.uk-lon1.upcloud.host Tue Dec 18 16:09
x 2
Brute-Force SSH
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/user/11506