User Kinsei Engineering Inc., the webmaster of kinsei.jp, joined AbuseIPDB in October 2022 and has reported 139,573 IP addresses.

Standing (weight) is good.

ACTIVE USER WEBMASTER SUPPORTER
IP Date Comment Categories
5.42.20.66
UFW:High-frequency access to non-released SSH or Telnet ports
Port Scan SSH
117.241.192.115
UFW:High-frequency access to non-released SSH or Telnet ports
Port Scan SSH
1.192.130.38
DBFilter:Repeated invalid access to unused databases
Port Scan SQL Injection
178.215.236.89
Postfix,Possible SPAM, Did not send the SMTP commands correctly.
Email Spam Brute-Force
128.201.218.79
UFW:High-frequency access to non-released SSH or Telnet ports
Port Scan SSH
1.234.63.161
Dovecot:Login attempts using previously leaked login information.
Email Spam Brute-Force
112.199.143.231
Dovecot:Login attempts using previously leaked login information.
Email Spam Brute-Force
222.246.126.197
UFW:High-frequency access to non-released SSH or Telnet ports
Port Scan SSH
91.92.250.101
DBFilter:Repeated invalid access to unused databases
Port Scan SQL Injection
76.136.164.157
Dovecot:Login attempts using previously leaked login information.
Email Spam Brute-Force
151.237.115.208
Dovecot:Login attempts using previously leaked login information.
Email Spam Brute-Force
176.161.166.113
Dovecot:Login attempts using previously leaked login information.
Email Spam Brute-Force
175.165.163.239
Postfix,Possible SPAM, Postscreen, Received incorrect commands at a high frequency.
Email Spam Brute-Force
2408:832e:c271:988e:9cc4:1911:d1cd:4f21
Postfix,Possible SPAM, Did not send the SMTP commands correctly.
Email Spam Brute-Force
91.92.249.38
UFW:High-frequency access to non-released ports used by software with known vulnerabilities.
Port Scan
49.98.136.33
nginx:Illicit login attempts to the CMS, or investigation into CMS plugins with vulnerabilities.
Web Spam Brute-Force Web App Attack
58.241.22.234
DBFilter:Repeated invalid access to unused databases
Port Scan SQL Injection
109.160.19.188
UFW:High-frequency access to non-released SSH or Telnet ports
Port Scan SSH
193.26.115.188
nginx:Illicit login attempts to the CMS, or investigation into CMS plugins with vulnerabilities.
Web Spam Brute-Force Web App Attack
106.105.230.23
UFW:High-frequency access to non-released SSH or Telnet ports
Port Scan SSH
172.245.112.239
Postfix,Possible SPAM, Postscreen, Received incorrect commands at a high frequency.
Email Spam Brute-Force
47.238.176.130
UFW:High-frequency access to unused ports
Port Scan
111.124.99.218
UFW:High-frequency access to non-released SSH or Telnet ports
Port Scan SSH
45.128.232.107
UFW:High-frequency access to non-released ports used by software with known vulnerabilities.
Port Scan
187.85.2.216
UFW:High-frequency access to non-released SSH or Telnet ports
Port Scan SSH