Check an IP Address, Domain Name, or Subnet

e.g. 3.236.234.223, microsoft.com, or 5.188.10.0/24


User Plutiara joined AbuseIPDB in October 2018 and has reported 58 IP addresses.

Standing (weight) is good.

ACTIVE USER
IP Date Comment Categories
5.254.77.154
Port Scan Hacking Spoofing Brute-Force
192.241.220.21
Port Scan Hacking Spoofing Brute-Force
192.241.218.128
Port Scan Hacking Brute-Force
164.52.24.162
Port Scan Hacking Spoofing Brute-Force
164.52.24.176
Port Scan Hacking Brute-Force
139.59.84.207
Port Scan Hacking Brute-Force
118.193.103.197
Port Scan Brute-Force
139.180.135.212
139.180.135.212 failed to pre-process ph1 packet (side: 1, status 1).
Port Scan Hacking Brute-Force
184.105.247.218
184.105.247.218 failed to pre-process ph1 packet (side: 1, status 1).
Port Scan Brute-Force
164.52.24.189
164.52.24.189
Port Scan Hacking Brute-Force
45.83.64.109
Port Scan Hacking Brute-Force
178.128.241.157
Port Scan Hacking Brute-Force
152.32.142.103
Port Scan Hacking Brute-Force
184.105.139.73
184.105.139.73 failed to get valid proposal.
Port Scan Hacking Brute-Force
64.62.197.154
64.62.197.154
Port Scan Hacking Brute-Force
103.139.213.234
103.139.213.234 failed to get valid proposal.
Port Scan Hacking Brute-Force
64.62.197.83
64.62.197.83 failed to get valid proposal.
Port Scan Hacking Brute-Force
46.102.153.146
jan/28/2022 07:13:18 46.102.153.146 parsing packet failed, possible cause: wrong password
DNS Poisoning Port Scan Spoofing Brute-Force
184.105.139.126
184.105.139.126 phase1 negotiation failed.
Port Scan Brute-Force
184.105.139.126
184.105.139.126
Port Scan Brute-Force
43.129.33.99
43.129.33.99
Port Scan Brute-Force
184.105.247.196
184.105.247.196 phase1 negotiation failed.
Port Scan Brute-Force
74.82.47.49
Port Scan Brute-Force
103.18.244.217
Phishing Hacking Bad Web Bot Exploited Host Web App Attack
216.218.206.72
Port Scan Brute-Force
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com