IP address


.00014.29.227.115
Shodan(more info)
Passive DNS
Tags: Login attempts
IP blacklists
Blocklist.net.ua
14.29.227.115 is listed on the Blocklist.net.ua blacklist.

Description: BlockList contains IP addresses that perform attacks,<br>send spam or brute force passwords to the blocking list.
Type of feed: primary (feed detail page)

Last checked at: 2024-03-26 23:15:01.639000
Was present on blacklist at: 2024-02-05 23:15, 2024-02-06 03:15, 2024-02-06 07:15, 2024-02-06 11:15, 2024-02-06 15:15, 2024-02-06 19:15, 2024-02-16 19:15, 2024-02-16 23:15, 2024-02-17 03:15, 2024-02-17 07:15, 2024-02-17 11:15, 2024-02-17 15:15, 2024-03-01 15:15, 2024-03-01 19:15, 2024-03-01 23:15, 2024-03-02 03:15, 2024-03-02 07:15, 2024-03-02 11:15, 2024-03-17 19:15, 2024-03-17 23:15, 2024-03-18 03:15, 2024-03-18 07:15, 2024-03-18 11:15, 2024-03-18 15:15, 2024-03-26 03:15, 2024-03-26 07:15, 2024-03-26 11:15, 2024-03-26 15:15, 2024-03-26 19:15, 2024-03-26 23:15
CI Army
14.29.227.115 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2024-03-24 03:50:01.044000
Was present on blacklist at: 2024-02-10 03:50, 2024-02-17 03:50, 2024-02-20 03:50, 2024-03-03 03:50, 2024-03-19 03:50, 2024-03-20 03:50, 2024-03-21 03:50, 2024-03-22 03:50, 2024-03-23 03:50, 2024-03-24 03:50
blocklist.de SSH
14.29.227.115 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2024-04-06 10:05:00.409000
Was present on blacklist at: 2024-04-03 22:05, 2024-04-04 04:05, 2024-04-04 10:05, 2024-04-04 16:05, 2024-04-04 22:05, 2024-04-05 04:05, 2024-04-05 10:05, 2024-04-05 16:05, 2024-04-05 22:05, 2024-04-06 04:05, 2024-04-06 10:05
Warden events (1452)
2024-04-10
IntrusionUserCompromise (node.f6f462): 11
2024-04-09
AttemptLogin (node.8cbf96): 102
2024-04-08
AttemptLogin (node.8cbf96): 238
2024-04-07
ReconScanning (node.7d83c0): 1
2024-04-06
ReconScanning (node.7d83c0): 1
IntrusionUserCompromise (node.f6f462): 11
2024-04-03
ReconScanning (node.7d83c0): 1
2024-03-30
ReconScanning (node.7d83c0): 1
2024-03-28
ReconScanning (node.7d83c0): 1
2024-03-26
AttemptLogin (node.bd32ad): 29
ReconScanning (node.7d83c0): 1
2024-03-25
AttemptLogin (node.bd32ad): 26
2024-03-24
ReconScanning (node.7d83c0): 1
2024-03-17
AttemptLogin (node.bd32ad): 145
2024-03-16
AttemptLogin (node.bd32ad): 68
2024-03-15
AttemptLogin (node.8cbf96): 12
2024-03-07
AttemptLogin (node.bd32ad): 19
AttemptLogin (node.7956a5): 58
2024-03-06
AttemptLogin (node.7956a5): 277
AttemptLogin (node.bd32ad): 193
2024-03-05
ReconScanning (node.7d83c0): 1
2024-02-26
IntrusionUserCompromise (node.f6f462): 11
2024-02-18
AttemptLogin (node.8cbf96): 3
2024-02-17
AttemptLogin (node.8cbf96): 241
DShield reports (IP summary, reports)
2024-02-21
Number of reports: 1215
Distinct targets: 27
Origin AS
AS4134 - CHINANET-BACKBONE
BGP Prefix
14.16.0.0/12
fmp
{'general': 0.692603588104248}
geo
China, Shenzhen
🕑 Asia/Shanghai
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
14.16.0.0 - 14.31.255.255
last_activity
2024-04-10 18:48:01.807000
last_warden_event
2024-04-10 18:48:01.807000
rep
0.0
reserved_range
0
Shodan's InternetDB
Open ports: 1521, 10000
Tags:
CPEs:
ts_added
2023-08-06 12:26:13.609000
ts_last_update
2024-04-27 12:26:20.334000

Warden event timeline

DShield event timeline

Presence on blacklists