Check an IP Address, Domain Name, or Subnet

e.g. 3.237.186.116, microsoft.com, or 5.188.10.0/24


User ChillScanner joined AbuseIPDB in April 2020 and has reported 2,728,099* IP addresses.

*Cached value. Updated daily.

LEGENDARY REPORTER ACTIVE USER WEBMASTER SUPPORTER
IP Date Comment Categories
113.22.216.140
<SMB> TCP (SYN) 113.22.216.140:63710 -> port 445, len 52
Port Scan
95.56.161.146
<SMB> TCP (SYN) 95.56.161.146:53072 -> port 445, len 52
Port Scan
51.15.83.17
<TELNET, SSH> TCP (SYN) 51.15.83.17:24424 -> port 23, len 44
Port Scan SSH
181.215.215.2
<SMB> TCP (SYN) 181.215.215.2:45408 -> port 445, len 44
Port Scan
107.174.26.66
<TELNET, SSH> TCP (SYN) 107.174.26.66:48638 -> port 22, len 44
Port Scan SSH
14.162.225.29
<SMB> TCP (SYN) 14.162.225.29:58950 -> port 445, len 52
Port Scan
185.200.118.85
<SOCKS> TCP (SYN) 185.200.118.85:39587 -> port 1080, len 44
Port Scan
101.109.38.127
<WWW> TCP (SYN) 101.109.38.127:28388 -> port 80, len 44
Port Scan
183.15.121.162
<TELNET, SSH> TCP (SYN) 183.15.121.162:40898 -> port 23, len 44
Port Scan SSH
178.19.183.14
<TRS-604> TCP (SYN) 178.19.183.14:2489 -> port 7547, len 44
Port Scan Brute-Force
178.44.200.160
<SMB> TCP (SYN) 178.44.200.160:64337 -> port 445, len 52
Port Scan
45.148.121.85
<WWW> TCP (SYN) 45.148.121.85:53422 -> port 8080, len 44
Port Scan
118.96.36.146
<SMB> TCP (SYN) 118.96.36.146:59328 -> port 445, len 48
Port Scan
113.110.224.180
<SMB> TCP (SYN) 113.110.224.180:51029 -> port 445, len 52
Port Scan
143.202.12.42
<SMB> TCP (SYN) 143.202.12.42:59955 -> port 445, len 44
Port Scan
192.241.237.220
<SMSS SQL> TCP (SYN) 192.241.237.220:53666 -> port 1433, len 44
Port Scan SQL Injection
124.134.43.58
<SMSS SQL> TCP (SYN) 124.134.43.58:24931 -> port 1433, len 52
Port Scan SQL Injection
178.19.152.185
<TRS-604> TCP (SYN) 178.19.152.185:54509 -> port 7547, len 44
Port Scan Brute-Force
178.19.250.44
<TRS-604> TCP (SYN) 178.19.250.44:60272 -> port 7547, len 44
Port Scan Brute-Force
184.105.247.246
<RDP> TCP (SYN) 184.105.247.246:37700 -> port 3389, len 44
Port Scan Brute-Force
198.27.108.202
<SMSS SQL> TCP (SYN) 198.27.108.202:49713 -> port 1433, len 44
Port Scan SQL Injection
211.229.30.62
<WWW> TCP (SYN) 211.229.30.62:32896 -> port 80, len 60
Port Scan
102.47.6.123
<TELNET, SSH> TCP (SYN) 102.47.6.123:4915 -> port 23, len 44
Port Scan SSH
59.127.123.112
<TELNET, SSH> TCP (SYN) 59.127.123.112:13965 -> port 23, len 44
Port Scan SSH
119.147.213.62
<SMSS SQL> TCP (SYN) 119.147.213.62:48931 -> port 1433, len 44
Port Scan SQL Injection
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/user/42067