IP address


.463119.28.133.29
Shodan(more info)
Passive DNS
Tags:
IP blacklists
Spamhaus PBL
119.28.133.29 is listed on the Spamhaus PBL blacklist.

Description: The Spamhaus PBL is a DNSBL database of end-user IP address ranges which should not be delivering unauthenticated SMTP email to any Internet mail server except those provided for specifically by an ISP for that customer's use.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-03-22 22:38:10.575000
Was present on blacklist at: 2026-03-15 22:38, 2026-03-22 22:38
blocklist.de SSH
119.28.133.29 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-24 11:05:00.306000
Was present on blacklist at: 2026-03-16 05:05, 2026-03-16 11:05, 2026-03-16 17:05, 2026-03-16 23:05, 2026-03-17 05:05, 2026-03-17 11:05, 2026-03-17 17:05, 2026-03-23 23:05, 2026-03-24 05:05, 2026-03-24 11:05
blocklist.de web-login
119.28.133.29 is listed on the blocklist.de web-login blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-19 17:05:00.209000
Was present on blacklist at: 2026-03-17 23:05, 2026-03-18 05:05, 2026-03-18 11:05, 2026-03-18 17:05, 2026-03-18 23:05, 2026-03-19 05:05, 2026-03-19 11:05, 2026-03-19 17:05
blocklist.de Apache
119.28.133.29 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-19 17:05:00.283000
Was present on blacklist at: 2026-03-17 23:05, 2026-03-18 05:05, 2026-03-18 11:05, 2026-03-18 17:05, 2026-03-18 23:05, 2026-03-19 05:05, 2026-03-19 11:05, 2026-03-19 17:05
CI Army
119.28.133.29 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2026-03-24 03:50:01.126000
Was present on blacklist at: 2026-03-18 03:50, 2026-03-19 03:50, 2026-03-20 03:50, 2026-03-21 03:50, 2026-03-22 03:50, 2026-03-23 03:50, 2026-03-24 03:50
AbuseIPDB
119.28.133.29 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-03-23 05:00:00.691000
Was present on blacklist at: 2026-03-20 05:00, 2026-03-21 05:00, 2026-03-22 05:00, 2026-03-23 05:00
Echelon TLS/SSL crawler
119.28.133.29 is listed on the Echelon TLS/SSL crawler blacklist.

Description: TLS/SSL connection fingerprinting detected via Suricata
Type of feed: primary (feed detail page)

Last checked at: 2026-03-24 10:40:00.496000
Was present on blacklist at: 2026-03-20 10:40, 2026-03-21 10:40, 2026-03-22 10:40, 2026-03-23 10:40, 2026-03-24 10:40

Threat categories

TLRoleCategoryDetails
65 src login protocol: ssh, telnet
port: 23
58 src scan
36 src

Warden events (161)
2026-03-24
IntrusionUserCompromise (node.cfb4f7): 17
2026-03-23
IntrusionUserCompromise (node.cfb4f7): 18
2026-03-22
IntrusionUserCompromise (node.cfb4f7): 19
2026-03-21
IntrusionUserCompromise (node.cfb4f7): 15
2026-03-20
IntrusionUserCompromise (node.cfb4f7): 6
2026-03-19
IntrusionUserCompromise (node.cfb4f7): 22
2026-03-18
IntrusionUserCompromise (node.cfb4f7): 42
2026-03-17
IntrusionUserCompromise (node.cfb4f7): 5
2026-03-16
IntrusionUserCompromise (node.cfb4f7): 12
AttemptLogin (node.40929a): 1
2026-03-15
IntrusionUserCompromise (node.cfb4f7): 4
DShield reports (IP summary, reports)
2026-03-15
Number of reports: 11
Distinct targets: 3
2026-03-16
Number of reports: 15
Distinct targets: 9
2026-03-17
Number of reports: 70
Distinct targets: 20
2026-03-18
Number of reports: 44
Distinct targets: 16
2026-03-19
Number of reports: 60
Distinct targets: 19
2026-03-20
Number of reports: 36
Distinct targets: 14
2026-03-21
Number of reports: 37
Distinct targets: 15
2026-03-22
Number of reports: 33
Distinct targets: 16
2026-03-23
Number of reports: 27
Distinct targets: 16
Origin AS
AS132203 - TENCENT-NET-AP-CN
BGP Prefix
119.28.132.0/23
geo
Hong Kong, Hong Kong
🕑 Asia/Hong_Kong
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
119.28.0.0 - 119.29.255.255
last_activity
2026-03-24 06:40:25
last_warden_event
2026-03-24 06:40:25
rep
0.4633851732526507
reserved_range
0
ts_added
2026-03-15 22:38:07.926000
ts_last_update
2026-03-24 11:06:26.762000

Warden event timeline

DShield event timeline

Presence on blacklists