User Noxia , the webmaster of noxia.cloud, joined AbuseIPDB in September 2024 and has reported 13,862 IP addresses.
Standing (weight) is good.
ACTIVE USER
WEBMASTER
IP | Date | Comment | Categories |
---|---|---|---|
89.248.165.88 |
Port scan detected from 89.248.165.88 on the following ports: 222,5555,777,
|
Port Scan Brute-Force | |
165.227.109.223 |
Failed SSH attempts from 165.227.109.223 on port 40384 using username root
|
Brute-Force SSH | |
167.71.76.217 |
Failed SSH attempts from 167.71.76.217 on port 10196 using username usman
|
Brute-Force SSH | |
109.196.99.53 |
Failed SSH attempts from 109.196.99.53 on port 39178 using username celery
|
Brute-Force SSH | |
45.142.193.242 |
Port scan detected from 45.142.193.242 on the following ports: 3052,3789,
|
Port Scan Brute-Force | |
103.139.193.168 |
Failed SSH attempts from 103.139.193.168 on port 45664 using username root
|
Brute-Force SSH | |
202.51.214.99 |
Failed SSH attempts from 202.51.214.99 on port 38970 using username fran
|
Brute-Force SSH | |
154.221.17.23 |
Failed SSH attempts from 154.221.17.23 on port 41844 using username esb
|
Brute-Force SSH | |
165.232.100.223 |
Failed SSH attempts from 165.232.100.223 on port 59560 using username root
|
Brute-Force SSH | |
134.122.31.64 |
Failed SSH attempts from 134.122.31.64 on port 41758 using username sonarqube
|
Brute-Force SSH | |
103.143.230.237 |
Failed SSH attempts from 103.143.230.237 on port 54026 using username root
|
Brute-Force SSH | |
42.63.69.103 |
Failed SSH attempts from 42.63.69.103 on port 33988 using username root
|
Brute-Force SSH | |
116.110.77.11 |
Failed SSH attempts from 116.110.77.11 on port 60350 using username user
|
Brute-Force SSH | |
103.172.236.241 |
Failed SSH attempts from 103.172.236.241 on port 55418 using username root
|
Brute-Force SSH | |
43.242.231.68 |
Failed SSH attempts from 43.242.231.68 on port 33486 using username root
|
Brute-Force SSH | |
146.190.60.168 |
Failed SSH attempts from 146.190.60.168 on port 53508 using username root
|
Brute-Force SSH | |
180.244.165.162 |
Failed SSH attempts from 180.244.165.162 on port 10975 using username root
|
Brute-Force SSH | |
181.115.156.59 |
Failed SSH attempts from 181.115.156.59 on port 54362 using username code87
|
Brute-Force SSH | |
84.54.64.50 |
Failed SSH attempts from 84.54.64.50 on port 45090 using username reza
|
Brute-Force SSH | |
89.208.103.230 |
Failed SSH attempts from 89.208.103.230 on port 44038 using username root
|
Brute-Force SSH | |
222.101.97.105 |
Failed SSH attempts from 222.101.97.105 on port 58461 using username admin
|
Brute-Force SSH | |
113.201.104.166 |
Failed SSH attempts from 113.201.104.166 on port 2051 using username root
|
Brute-Force SSH | |
45.142.193.242 |
Port scan detected from 45.142.193.242 on the following ports: 3309,
|
Port Scan Brute-Force | |
45.142.193.242 |
Port scan detected from 45.142.193.242 on the following ports: 1504,
|
Port Scan Brute-Force | |
43.228.76.124 |
Failed SSH attempts from 43.228.76.124 on port 38478 using username bill
|
Brute-Force SSH |