User jdbk joined AbuseIPDB in June 2024 and has reported 401 IP addresses.
Standing (weight) is good.
ACTIVE USER
IP | Date | Comment | Categories |
---|---|---|---|
45.148.10.81 |
(IMAP) Unknown IMAP4 command
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack FTP Brute-Force Ping of Death Phishing Fraud VoIP Open Proxy Web Spam Email Spam Blog Spam VPN IP Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack SSH | |
45.148.10.81 |
(ssp_ssh) Protocol mismatch
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack FTP Brute-Force Ping of Death Phishing Fraud VoIP Open Proxy Web Spam Email Spam Blog Spam VPN IP Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack SSH | |
45.148.10.242 |
ET COMPROMISED Known Compromised or Hostile Host Traffic group 18
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack FTP Brute-Force Ping of Death Phishing Fraud VoIP Open Proxy Web Spam Email Spam Blog Spam VPN IP Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack | |
80.242.208.68 |
ET COMPROMISED Known Compromised or Hostile Host Traffic group 20
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack FTP Brute-Force Ping of Death Phishing Fraud VoIP Open Proxy Web Spam Email Spam Blog Spam VPN IP Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack | |
93.113.63.8 |
ET COMPROMISED Known Compromised or Hostile Host Traffic group 21
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack FTP Brute-Force Ping of Death Phishing Fraud VoIP Open Proxy Web Spam Email Spam Blog Spam VPN IP Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack SSH | |
5.135.90.165 |
ET COMPROMISED Known Compromised or Hostile Host traffic group 17
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack FTP Brute-Force Ping of Death Phishing Fraud VoIP Open Proxy Web Spam Email Spam Blog Spam VPN IP Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack | |
115.231.78.15 |
(ssp_ssl) Invalid Client HELLO after Server HELLO Detected
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack FTP Brute-Force Ping of Death Phishing Open Proxy Web Spam Email Spam Blog Spam VPN IP Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack | |
139.162.184.106 |
SERVER-WEBAPP Apache HTTP Server httpd directory traversal attempt
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack FTP Brute-Force Ping of Death Phishing Fraud VoIP Open Proxy Web Spam Email Spam Blog Spam Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack | |
65.49.20.107 |
SURICATA ICMP4 invalid checksum
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack FTP Brute-Force Ping of Death Phishing Open Proxy Web Spam Email Spam Blog Spam Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack IoT Targeted | |
184.105.143.133 |
SURICATA ICMP4 invalid checksum
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack FTP Brute-Force Ping of Death Phishing Open Proxy Web Spam Email Spam Blog Spam VPN IP Port Scan Hacking Spoofing Web App Attack | |
139.162.184.106 |
SERVER-WEBAPP TP-Link Archer Router command injection attempt
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack FTP Brute-Force Ping of Death Phishing Fraud VoIP Open Proxy Web Spam Email Spam Blog Spam VPN IP Port Scan Hacking SQL Injection Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack SSH IoT Targeted | |
42.51.41.163 |
SERVER-WEBAPP Apache HTTP Server httpd directory traversal attempt
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack Open Proxy Web Spam Email Spam Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack | |
5.42.74.254 |
ET COMPROMISED Known Compromised or Hostile Host Traffic group 15
|
DNS Compromise DNS Poisoning Fraud Orders DDoS Attack Open Proxy Web Spam Email Spam Blog Spam Port Scan Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack | |
77.91.85.126 |
ET COMPROMISED Known Compromised or Hostile Host Traffic group 16
|
DNS Poisoning Fraud Orders DDoS Attack FTP Brute-Force Ping of Death Phishing Fraud VoIP Open Proxy Web Spam Email Spam Blog Spam VPN IP Port Scan Hacking SQL Injection Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack SSH | |
154.213.184.14 |
SERVER-OTHER RealTek UDPServer command injection attempt
|
Fraud Orders DDoS Attack Open Proxy Web Spam Email Spam Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack | |
115.231.78.15 |
|
Fraud Orders DDoS Attack FTP Brute-Force Open Proxy Web Spam Email Spam Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack | |
152.32.207.229 |
(spp_sip) Method is unknown
|
DNS Poisoning Fraud Orders DDoS Attack Web Spam Email Spam Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack | |
194.50.16.5 |
ET COMPROMISED Known Compromised or Hostile Host Traffic group 11
|
DDoS Attack FTP Brute-Force Phishing Web Spam Email Spam Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host | |
5.42.74.254 |
ET COMPROMISED Known Compromised or Hostile Host Traffic group 14
|
DDoS Attack Phishing Web Spam Email Spam Port Scan Hacking Spoofing Brute-Force Bad Web Bot Exploited Host Web App Attack | |
5.42.74.254 |
ET COMPROMISED Known Compromised or Hostile Host Traffic group 14
|
Web Spam Email Spam Hacking Web App Attack | |
45.148.10.230 |
SERVER-WEBAPP PHP PHP-CGI command execution attempt
|
Web Spam Email Spam Hacking Web App Attack | |
27.43.205.10 |
SERVER-WEBAPP GPON Router authentication bypass and command injection attempt
|
Web Spam Web App Attack | |
115.231.78.15 |
SURICATA STREAM 3way handshake excessive different SYNs
|
Hacking | |
115.231.78.15 |
SURICATA STREAM SYN resend
|
Brute-Force | |
5.135.90.165 |
ET COMPROMISED Known Compromised or Hostile Host Traffic group 13
|
Web Spam Web App Attack |