Enter an IP Address, Domain Name, or Subnet:

e.g.   34.200.218.187, microsoft.com, or 5.188.10.0/24


User andrew.stream, the webmaster of andrew.stream, joined AbuseIPDB in March 2017 and has reported 1,268,301* IP addresses.

*Cached value. Updated daily.

LEGENDARY REPORTER ACTIVE USER WEBMASTER SUPPORTER
IP Date Comment Categories
202.143.120.57
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(08080834)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
58.213.48.218
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(08080834)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
42.86.176.103
[portscan] tcp/23 [TELNET]
in BlMailspike:'listed'
*(RWIN=5779)(08080834)
Web Spam Email Spam Port Scan Hacking Brute-Force
92.39.21.66
[portscan] tcp/23 [TELNET]
*(RWIN=6372)(08080834)
Port Scan Hacking Brute-Force
195.22.253.134
[portscan] tcp/23 [TELNET]
*(RWIN=54611)(08080834)
Port Scan Hacking Brute-Force
157.245.66.157
[portscan] tcp/1434 [MsSQL DAC]
*(RWIN=65535)(08080834)
Port Scan Hacking SQL Injection Brute-Force
58.18.133.165
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(08080834)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
198.27.117.145
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(08080834)
Port Scan Hacking SQL Injection Brute-Force Exploited Host
180.232.99.46
[portscan] tcp/23 [TELNET]
*(RWIN=8662)(08080834)
Port Scan Hacking Brute-Force
47.111.71.172
[portscan] tcp/23 [TELNET]
*(RWIN=61464)(08080834)
Port Scan Hacking Brute-Force
79.31.231.63
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=14600)(08080834)
Port Scan Web App Attack
34.70.62.204
[portscan] udp/1900 [ssdp]
*(RWIN=-)(08080834)
Port Scan
177.139.195.214
Port Scan Hacking Brute-Force SSH
80.82.77.212
[portscan] udp/1900 [ssdp]
*(RWIN=-)(08080834)
Port Scan
118.68.65.156
[portscan] tcp/23 [TELNET]
*(RWIN=29017)(08080834)
Port Scan Hacking Brute-Force
23.94.93.106
Port Scan Hacking Brute-Force SSH
202.215.74.126
[portscan] tcp/23 [TELNET]
*(RWIN=2996)(08080834)
Port Scan Hacking Brute-Force
112.33.112.170
Port Scan Hacking
79.6.124.241
[portscan] tcp/23 [TELNET]
*(RWIN=48003)(08080834)
Port Scan Hacking Brute-Force
113.61.206.139
[portscan] tcp/23 [TELNET]
*(RWIN=38157)(08080834)
Port Scan Hacking Brute-Force
41.32.52.173
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=14600)(08080834)
Port Scan Web App Attack
187.19.204.146
[portscan] tcp/23 [TELNET]
*(RWIN=52900)(08080834)
Port Scan Hacking Brute-Force
183.80.212.43
[portscan] tcp/23 [TELNET]
*(RWIN=62414)(08080834)
Port Scan Hacking Brute-Force
80.82.78.85
[portscan] tcp/22 [SSH]
[scan/connect: 2 time(s)]
*(RWIN=65535)(08080834)
Port Scan Hacking Brute-Force SSH
185.172.110.222
[portscan] udp/3702 [ws-discovery]
*(RWIN=-)(08080834)
Port Scan
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/user/13354