Check an IP Address, Domain Name, or Subnet

e.g. 34.236.245.255, microsoft.com, or 5.188.10.0/24


User r3y3m3r1t0 joined AbuseIPDB in July 2020 and has reported 3,606* IP addresses.

*Cached value. Updated daily.

ACTIVE USER WEBMASTER
IP Date Comment Categories
45.129.33.149
Intrusion -> SRC=45.129.33.149 PROTO=TCP SPT=53024 DPT=39961
Port Scan
36.110.26.43
Intrusion -> SRC=36.110.26.43 PROTO=TCP SPT=24349 DPT=5432
Port Scan
42.225.205.69
Intrusion -> SRC=42.225.205.69 PROTO=TCP SPT=22757 DPT=23
Port Scan
85.209.0.230
Intrusion -> SRC=85.209.0.230 PROTO=TCP SPT=62872 DPT=3128
Port Scan
45.145.67.74
Intrusion -> SRC=45.145.67.74 PROTO=TCP SPT=41176 DPT=58585
Port Scan
92.63.197.55
Intrusion -> SRC=92.63.197.55 PROTO=TCP SPT=51262 DPT=20231
Port Scan
92.63.196.13
SRC=92.63.196.13 PROTO=TCP SPT=53896 DPT=52233
Port Scan
46.101.137.103
SRC=46.101.137.103 PROTO=TCP SPT=59126 DPT=4244
Port Scan
185.216.140.192
SRC=185.216.140.192 PROTO=TCP SPT=44088 DPT=81
Port Scan
198.20.103.244
SRC=198.20.103.244 PROTO=TCP SPT=28776 DPT=2455
Port Scan
193.27.229.207
SRC=193.27.229.207 PROTO=TCP SPT=47222 DPT=43097
Port Scan
45.129.33.145
SRC=45.129.33.145 PROTO=TCP SPT=56007 DPT=24947
Port Scan
80.82.64.73
SRC=80.82.64.73 PROTO=TCP SPT=51013 DPT=24820
Port Scan
203.218.216.210
SRC=203.218.216.210 PROTO=TCP SPT=32171 DPT=23
Port Scan
45.146.164.169
SRC=45.146.164.169 PROTO=TCP SPT=51541 DPT=4030
Port Scan
94.102.57.240
SRC=94.102.57.240 PROTO=TCP SPT=48402 DPT=57253
Port Scan
89.248.162.161
SRC=89.248.162.161 PROTO=TCP SPT=59331 DPT=54012
Port Scan
94.102.49.109
SRC=94.102.49.109 PROTO=TCP SPT=59337 DPT=55964
Port Scan
45.129.33.154
SRC=45.129.33.154 PROTO=TCP SPT=56710 DPT=3970
Port Scan
62.14.240.125
Detect UDP port scan attack, scan packet from 62.14.240.125
Port Scan
51.195.18.30
SRC=51.195.18.30 PROTO=TCP SPT=47030 DPT=3792
Port Scan
194.26.25.124
SRC=194.26.25.124 PROTO=TCP SPT=40429 DPT=2881
Port Scan Hacking
220.200.25.114
Invalid user wayne from 220.200.25.114 port 7016
Brute-Force SSH
191.5.99.84
Invalid user admin from 191.5.99.84 port 51492
Brute-Force SSH
103.219.207.118
Invalid user ftpuser from 103.219.207.118 port 37120
Brute-Force SSH
** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/user/45545