Check an IP Address, Domain Name, or Subnet

e.g. 3.234.252.109, microsoft.com, or 5.188.10.0/24


User andrew.stream, the webmaster of andrew.stream, joined AbuseIPDB in March 2017 and has reported 1,431,729 IP addresses.

Standing (weight) is good.

ACTIVE USER WEBMASTER SUPPORTER
IP Date Comment Categories
45.5.202.25
[portscan] tcp/23 [TELNET]
*(RWIN=14600)(06150710)
Port Scan Hacking Brute-Force
113.116.107.192
[portscan] tcp/23 [TELNET]
*(RWIN=55198)(06150710)
Port Scan Hacking Brute-Force
128.199.155.114
Open Proxy Port Scan Hacking Brute-Force
186.210.54.230
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(06150710)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
59.98.180.43
[portscan] tcp/23 [TELNET]
*(RWIN=57678)(06150710)
Port Scan Hacking Brute-Force
201.213.219.34
[portscan] tcp/23 [TELNET]
*(RWIN=7228)(06150710)
Port Scan Hacking Brute-Force
167.248.133.21
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=1024)(06150710)
Port Scan Web App Attack
78.26.164.218
[portscan] tcp/23 [TELNET]
*(RWIN=37420)(06150710)
Port Scan Hacking Brute-Force
222.164.102.195
[portscan] tcp/23 [TELNET]
*(RWIN=26166)(06150710)
Port Scan Hacking Brute-Force
199.19.224.153
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=65535)(06150710)
Port Scan Web App Attack
171.105.5.96
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(06150710)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
175.183.90.212
[portscan] tcp/23 [TELNET]
*(RWIN=5679)(06150710)
Port Scan Hacking Brute-Force
92.118.161.53
[portscan] tcp/110 [POP3]
*(RWIN=1024)(06150710)
Port Scan Hacking Brute-Force
84.23.138.151
[portscan] tcp/23 [TELNET]
*(RWIN=34240)(06150710)
Port Scan Hacking Brute-Force
124.123.92.53
[portscan] tcp/22 [SSH]
[scan/connect: 2 time(s)]
*(RWIN=8192)(06150710)
Port Scan Hacking Brute-Force SSH
192.241.214.51
[portscan] tcp/23 [TELNET]
*(RWIN=65535)(06150710)
Port Scan Hacking Brute-Force
186.33.125.72
[portscan] tcp/23 [TELNET]
*(RWIN=58736)(06150710)
Port Scan Hacking Brute-Force
192.241.221.47
[portscan] tcp/23 [TELNET]
*(RWIN=65535)(06150710)
Port Scan Hacking Brute-Force
92.63.197.71
[portscan] tcp/3389 [MS RDP]
*(RWIN=1024)(06150710)
Port Scan Hacking Brute-Force Exploited Host
117.203.28.211
[portscan] tcp/23 [TELNET]
*(RWIN=699)(06150710)
Port Scan Hacking Brute-Force
192.241.218.87
[portscan] tcp/22 [SSH]
*(RWIN=65535)(06150710)
Port Scan Hacking Brute-Force SSH
142.105.231.27
[portscan] tcp/23 [TELNET]
*(RWIN=63085)(06150710)
Port Scan Hacking Brute-Force
5.101.0.194
[portscan] tcp/3389 [MS RDP]
*(RWIN=1024)(06150710)
Port Scan Hacking Brute-Force Exploited Host
192.241.218.199
[portscan] tcp/22 [SSH]
*(RWIN=65535)(06150710)
Port Scan Hacking Brute-Force SSH
113.178.137.139
[portscan] tcp/23 [TELNET]
*(RWIN=2674)(06150710)
Port Scan Hacking Brute-Force
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/user/13354