Check an IP Address, Domain Name, or Subnet

e.g. 34.204.172.188, microsoft.com, or 5.188.10.0/24


User gbetsis, the webmaster of gbetsis.com, joined AbuseIPDB in October 2018 and has reported 735,927 IP addresses.

Standing (weight) is poor.

ACTIVE USER WEBMASTER SUPPORTER
IP Date Comment Categories
196.70.253.21
TCP Port Scanning
Port Scan Exploited Host
165.227.98.66
SIP Server BruteForce Attack - udp port 5060
Port Scan
159.203.74.53
SIP Server BruteForce Attack - udp port 5060
Port Scan
80.253.244.169
SIP Server BruteForce Attack - udp port 5060
Port Scan
190.13.178.65
SMB Server BruteForce Attack - tcp/445
Port Scan Brute-Force
77.90.185.100
TCP Port Scanning
Port Scan Exploited Host
111.233.136.42
Telnet Server BruteForce Attack
Brute-Force
154.241.38.179
Telnet Server BruteForce Attack
Brute-Force
37.29.70.221
Telnet Server BruteForce Attack
Brute-Force
31.134.83.14
Telnet Server BruteForce Attack
Brute-Force
117.200.139.167
Telnet Server BruteForce Attack
Brute-Force
37.229.57.154
Telnet Server BruteForce Attack
Brute-Force
94.102.61.50
TCP Port Scanning
Port Scan Exploited Host
94.102.61.49
TCP Port Scanning
Port Scan Exploited Host
180.101.184.124
TCP Port Scanning
Port Scan Exploited Host
120.195.108.133
TCP Port Scanning
Port Scan Exploited Host
77.90.185.179
TCP Port Scanning
Port Scan Exploited Host
179.208.240.14
TCP Port Scanning
Port Scan Exploited Host
83.255.172.34
Telnet Server BruteForce Attack
Brute-Force
94.102.61.41
TCP Port Scanning
Port Scan Exploited Host
37.44.238.142
TCP Port Scanning
Port Scan Exploited Host
116.73.71.28
SMB Server BruteForce Attack - tcp/445
Port Scan Brute-Force
106.51.126.187
Telnet Server BruteForce Attack
Brute-Force
85.174.227.86
TCP Port Scanning
Port Scan Exploited Host
94.102.61.53
TCP Port Scanning
Port Scan Exploited Host
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com