IP Address: 65.49.1.94


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
14 days ago
[arem1] 2026-02-19 00:24:22, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
20 days ago
[probe-68-69] 2026-02-13 00:55:51, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
24 days ago
[probe-68-69] 2026-02-09 04:33:13, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
26 days ago
ipban 3.0.0 - 4653
BruteForce
RDP
one month ago
[rede-188] 2026-01-29 02:14:17, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
ipban 1.8.0
BruteForce
RDP
one month ago
[rede-188] 2026-01-26 06:53:30, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
Connection to port 6379 from port 65450
BruteForce
Redis
one month ago
[probe-168-134] 2026-01-19 07:26:14, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2026-01-17 07:51:45, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
ipban 1.8.0
BruteForce
RDP
one month ago
[probe-168-134] 2026-01-10 01:23:30, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[rede-188] 2026-01-08 13:27:29, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-68-69] 2025-12-26 09:30:08, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[arem1] 2025-12-24 06:31:20, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-168-134] 2025-12-14 03:12:41, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[arem1] 2025-12-14 00:20:11, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
2 months ago
ipban 1.8.0 - 14
BruteForce
RDP
2 months ago
[arem1] 2025-12-12 06:32:37, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[rede-188] 2025-12-06 01:07:57, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
3 months ago
ipban 3.0.0
BruteForce
RDP
3 months ago
[arem1] 2025-12-04 12:11:47, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-168-134] 2025-12-01 01:04:09, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
Connection to port 143 from port 58654
PortScan
Port 143
3 months ago
[arem1] 2025-11-29 12:02:48, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
3 months ago
ipban 1.8.0 - 14
BruteForce
RDP
3 months ago
[arem1] 2025-11-22 05:45:45, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Kamil
3 months ago
fail2ban
BruteForce
postfix
imcas
3 months ago
ipban 1.9.0 - 400
BruteForce
Apache
4 months ago
Connection to port 3389 from port 63660
BruteForce
RDP
tuya
4 months ago
ipban 2.0.1 - 14
BruteForce
RDP
4 months ago
[probe-168-134] 2025-11-01 10:03:37, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Kamil
4 months ago
fail2ban
BruteForce
postfix
4 months ago
[probe-68-69] 2025-10-21 03:16:40, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
ipban 1.8.0
BruteForce
RDP
5 months ago
[rede-188] 2025-09-29 03:05:40, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
fail2ban
BruteForce
dovecot
5 months ago
[rede-188] 2025-09-19 12:27:30, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-168-134] 2025-09-19 00:24:29, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
Connection to port 143 from port 16638
PortScan
Port 143
5 months ago
[rede-188] 2025-09-14 12:51:13, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-68-69] 2025-09-14 09:53:26, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[arem1] 2025-09-13 04:34:59, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[rede-188] 2025-09-09 03:46:00, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
6 months ago
ipban 3.0.0
BruteForce
RDP
6 months ago
fail2ban
BruteForce
dovecot
7 months ago
[probe-68-69] 2025-08-08 12:51:06, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-68-69] 2025-08-04 14:47:22, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
tuya
7 months ago
ipban 2.0.1 - 14
BruteForce
RDP
7 months ago
[probe-68-69] 2025-07-18 01:39:32, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
Connection to port 25 from port 18060
Spam
SMTP
7 months ago
[probe-68-69] 2025-07-13 11:36:14, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
8 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
8 months ago
ipban 3.0.0
BruteForce
RDP
8 months ago
[probe-168-134] 2025-07-05 12:09:19, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
8 months ago
ipban 1.8.1 - 14
BruteForce
RDP
8 months ago
[probe-168-134] 2025-06-29 11:58:23, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-28 03:56:33, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
Connection to port 5900 from port 46424
BruteForce
VNC
8 months ago
[probe-176-124] 2025-06-17 05:46:23, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-176-124] 2025-06-08 01:23:57, Client: 65.49.1.94, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
ipban 1.8.0
BruteForce
RDP
Anonymous
9 months ago
ipban 3.0.0
BruteForce
RDP
10 months ago
Connection to port 1521 from port 48227
BruteForce
Oracle
Nudlz
10 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
10 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
10 months ago
Connection to port 5900 from port 17448
BruteForce
VNC
Anonymous
11 months ago
ipban 2.0.0 - 14
BruteForce
RDP
11 months ago
ipban 1.8.0
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.1
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.1
BruteForce
RDP
imcas
one year ago
ipban 1.9.0 - Connection closed
BruteForce
SSH
Anonymous
one year ago
ipban 2.0.1
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 2.0.1 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
Anonymous
one year ago
ipban 1.8.0 - 14
BruteForce
RDP
Contact IPThreat