IP address


.611139.5.108.151
Shodan(more info)
Passive DNS
Tags:
IP blacklists
AbuseIPDB
139.5.108.151 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-05-11 04:00:00.564000
Was present on blacklist at: 2026-05-11 04:00
blocklist.de SSH
139.5.108.151 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-05-13 04:05:01.747000
Was present on blacklist at: 2026-05-11 04:05, 2026-05-11 10:05, 2026-05-11 16:05, 2026-05-11 22:05, 2026-05-12 04:05, 2026-05-12 10:05, 2026-05-12 16:05, 2026-05-12 22:05, 2026-05-13 04:05
Echelon SSH connection attempt
139.5.108.151 is listed on the Echelon SSH connection attempt blacklist.

Description: SSH connection attempt detected on port 22 or 2222
Type of feed: primary (feed detail page)

Last checked at: 2026-05-11 09:35:02.018000
Was present on blacklist at: 2026-05-11 09:35
Echelon SSH bruteforce
139.5.108.151 is listed on the Echelon SSH bruteforce blacklist.

Description: Multiple SSH authentication attempts detected
Type of feed: primary (feed detail page)

Last checked at: 2026-05-12 09:35:03.465000
Was present on blacklist at: 2026-05-11 09:35, 2026-05-12 09:35
Echelon TLS/SSL crawler
139.5.108.151 is listed on the Echelon TLS/SSL crawler blacklist.

Description: TLS/SSL connection fingerprinting detected via Suricata
Type of feed: primary (feed detail page)

Last checked at: 2026-05-12 09:40:03.096000
Was present on blacklist at: 2026-05-11 09:40, 2026-05-12 09:40
CI Army
139.5.108.151 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2026-05-12 02:50:00.816000
Was present on blacklist at: 2026-05-12 02:50

Threat categories

TLRoleCategoryDetails
75 src login protocol: ssh, telnet
port: 22, 23, 2222
65 src scan port: 22, 23, 80, 443, 2222, 2375
25 src

Warden events (35817)
2026-05-13
IntrusionUserCompromise (node.cfb4f7): 4822
ReconScanning (node.ce2b59): 5
2026-05-12
ReconScanning (node.ce2b59): 31
IntrusionUserCompromise (node.cfb4f7): 29387
AttemptLogin (node.70e749): 2
IntrusionUserCompromise (node.70e749): 1
2026-05-11
ReconScanning (node.ce2b59): 34
IntrusionUserCompromise (node.cfb4f7): 1528
2026-05-10
ReconScanning (node.ce2b59): 7
DShield reports (IP summary, reports)
2026-05-12
Number of reports: 166
Distinct targets: 22
Origin AS
AS142002 - SCLOUDPTELTD-AS
BGP Prefix
139.5.108.0/24
geo
China
🕑 Asia/Shanghai
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
139.5.108.0 - 139.5.111.255
last_activity
2026-05-13 03:40:00
last_warden_event
2026-05-13 03:40:00
rep
0.6108250858226996
reserved_range
0
Shodan's InternetDB
Open ports: 22
Tags:
CPEs: cpe:/a:openbsd:openssh:8.7
ts_added
2026-05-10 22:23:21.349000
ts_last_update
2026-05-13 05:02:35.799000

Warden event timeline

DShield event timeline

Presence on blacklists