ISP | ZeXoTeK IT-Services GmbH |
Country | Germany |
Website | zexotek.de |
Emails | |
IP Address Info including Location provided by ip2location.io |
Reporter | TimeStamp | Comment | Categories |
---|---|---|---|
Sefinek |
Jun 08, 2025 01:49 AM
1 week ago |
Blocked by UFW on NY01 [22/tcp]. Generated by:
Github
|
Port scan
SSH
Brute force
Phishing
|
hp-sg-sin1 |
Jun 07, 2025 11:35 PM
1 week ago |
Port Scan (22) SSH
|
Port scan
SSH
|
hp-us-chi1 |
Jun 07, 2025 09:57 PM
1 week ago |
Port Scan (22) SSH
|
Port scan
SSH
|
mielkan.com |
Jun 07, 2025 12:18 PM
1 week ago |
| blocked | mielkan-sgp [23/tcp] |
|
Port scan
IoT targeted
Brute force
Phishing
|
hp-de-fra1 |
Jun 07, 2025 11:16 AM
1 week ago |
Port Scan (23) TELNET
|
Port scan
|
hp-nl-ams1 |
Jun 07, 2025 10:08 AM
1 week ago |
Port Scan (22) SSH
|
Port scan
SSH
|
hp-au-syd1 |
Jun 07, 2025 10:07 AM
1 week ago |
Port Scan (22) SSH
|
Port scan
SSH
|
hp-es-mad1 |
Jun 07, 2025 08:40 AM
1 week ago |
Port Scan (23) TELNET
|
Port scan
|
hp-us-sjo1 |
Jun 07, 2025 08:25 AM
1 week ago |
Port Scan (23) TELNET
|
Port scan
|
Liam Denston |
Jun 07, 2025 08:22 AM
1 week ago |
Port Scan (23) TELNET
|
Port scan
|
hp-de-fra1 |
Jun 07, 2025 08:15 AM
1 week ago |
Port Scan (23) TELNET
|
Port scan
|
hp-us-chi1 |
Jun 05, 2025 02:14 AM
1 week ago |
Port Scan (22) SSH
|
Port scan
SSH
|
mielkan.com |
Jun 05, 2025 01:09 AM
1 week ago |
| blocked | mielkan [22/tcp] |
|
Port scan
SSH
Brute force
Phishing
|
mielkan.com |
Jun 05, 2025 12:26 AM
1 week ago |
| blocked | mielkan-sgp [22/tcp] |
|
Port scan
SSH
Brute force
Phishing
|
mielkan.com |
Jun 04, 2025 11:40 PM
1 week ago |
| blocked | mielkan-syd [22/tcp] |
|
Port scan
SSH
Brute force
Phishing
|
hp-es-mad1 |
May 31, 2025 06:33 AM
2 weeks ago |
Port Scan (22) SSH
|
Port scan
SSH
|
mielkan.com |
May 31, 2025 06:16 AM
2 weeks ago |
| blocked | mielkan-ams [23/tcp] |
|
Port scan
IoT targeted
Brute force
Phishing
|
hp-es-mad1 |
May 29, 2025 11:20 AM
2 weeks ago |
Port Scan (23) TELNET
|
Port scan
|
Sefinek |
May 29, 2025 11:05 AM
2 weeks ago |
Blocked by UFW on NY01 [23/tcp]. Generated by:
Github
|
Port scan
IoT targeted
Brute force
Phishing
|
hp-us-nyc1 |
May 29, 2025 09:37 AM
2 weeks ago |
Port Scan (23) TELNET
|
Port scan
|