Check an IP Address, Domain Name, or Subnet

e.g. 54.80.173.217, microsoft.com, or 5.188.10.0/24


User SecondEdge, the webmaster of www.second-edge.com, joined AbuseIPDB in August 2019 and has reported 134,362 IP addresses.

Standing (weight) is good.

ACTIVE USER WEBMASTER SUPPORTER
IP Date Comment Categories
120.92.134.94
SSH brute-force: detected 8 distinct username(s) / 24 distinct password(s) within a 24-hour window.
Brute-Force SSH
221.122.73.130
SSH brute-force: detected 10 distinct username(s) / 29 distinct password(s) within a 24-hour window.
Brute-Force SSH
92.204.129.225
Web scan/attack: detected 2 distinct attempt(s) within a 12-hour window (Git Variable Scan)
Web App Attack
143.110.248.63
SSH brute-force: detected 7 distinct username(s) / 18 distinct password(s) within a 24-hour window.
Brute-Force SSH
89.248.165.241
Port-scan: detected 1000 distinct ports within a 24-hour window.
Port Scan
46.101.138.138
SSH brute-force: detected 15 distinct username(s) / 38 distinct password(s) within a 24-hour window.
Brute-Force SSH
109.237.103.38
Web scan/attack: detected 2 distinct attempt(s) within a 12-hour window (Git Variable Scan)
Web App Attack
104.248.253.192
SSH brute-force: detected 7 distinct username(s) / 36 distinct password(s) within a 24-hour window.
Brute-Force SSH
164.90.217.133
SSH brute-force: detected 4 distinct username(s) / 12 distinct password(s) within a 24-hour window.
Brute-Force SSH
198.251.73.5
Web scan/attack: detected 6 distinct attempt(s) within a 12-hour window (Wordpress Admin)
Web App Attack
185.191.34.189
Port-scan: detected 101 distinct ports within a 24-hour window.
Port Scan
198.251.73.21
Web scan/attack: detected 3 distinct attempt(s) within a 12-hour window (Wordpress Admin)
Web App Attack
79.124.62.86
Port-scan: detected 125 distinct ports within a 24-hour window.
Port Scan
192.35.222.102
Web scan/attack: detected 3 distinct attempt(s) within a 12-hour window (Admin)
Web App Attack
128.199.247.40
SSH brute-force: detected 12 distinct username(s) / 30 distinct password(s) within a 24-hour window.
Brute-Force SSH
116.117.157.69
SSH brute-force: detected 6 distinct username(s) / 22 distinct password(s) within a 24-hour window.
Brute-Force SSH
159.203.18.202
Web scan/attack: detected 6 distinct attempt(s) within a 12-hour window (Git Variable Scan)
Web App Attack
45.146.164.100
Port-scan: detected 101 distinct ports within a 24-hour window.
Port Scan
79.124.62.82
Port-scan: detected 176 distinct ports within a 24-hour window.
Port Scan
92.255.85.237
SSH brute-force: detected 24 distinct username(s) / 48 distinct password(s) within a 24-hour window.
Brute-Force SSH
79.124.62.34
Port-scan: detected 132 distinct ports within a 24-hour window.
Port Scan
198.98.51.210
Web scan/attack: detected 1 distinct attempt(s) within a 12-hour window (Config probing (getuser))
Web App Attack
79.124.62.130
Port-scan: detected 210 distinct ports within a 24-hour window.
Port Scan
134.73.184.37
SSH brute-force: detected 12 distinct username(s) / 30 distinct password(s) within a 24-hour window.
Brute-Force SSH
79.124.62.110
Port-scan: detected 101 distinct ports within a 24-hour window.
Port Scan
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/user/32514?page=2