IP address
Tags:
Scanner
Static IP
IP in hostname
- IP blacklists
CI Army
144.172.101.224 is listed on the CI Army blacklist.
Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed:
primary (
feed detail page)
Last checked at:
2025-06-18 02:50:00.898000
Was present on blacklist at:
2025-06-14 02:50,
2025-06-15 02:50,
2025-06-16 02:50,
2025-06-17 02:50,
2025-06-18 02:50
AbuseIPDB
144.172.101.224 is listed on the AbuseIPDB blacklist.
Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed:
primary (
feed detail page)
Last checked at:
2025-07-12 04:00:00.650000
Was present on blacklist at:
2025-06-14 04:00,
2025-06-15 04:00,
2025-06-16 04:00,
2025-06-17 04:00,
2025-06-18 04:00,
2025-06-19 04:00,
2025-06-20 04:00,
2025-06-21 04:00,
2025-06-22 04:00,
2025-06-23 04:00,
2025-06-24 04:00,
2025-06-25 04:00,
2025-06-26 04:00,
2025-06-27 04:00,
2025-06-28 04:00,
2025-06-29 04:00,
2025-06-30 04:00,
2025-07-01 04:00,
2025-07-02 04:00,
2025-07-03 04:00,
2025-07-04 04:00,
2025-07-05 04:00,
2025-07-06 04:00,
2025-07-07 04:00,
2025-07-08 04:00,
2025-07-09 04:00,
2025-07-10 04:00,
2025-07-11 04:00,
2025-07-12 04:00
Turris greylist
144.172.101.224 is listed on the Turris greylist blacklist.
Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed:
primary (
feed detail page)
Last checked at:
2025-06-15 21:15:00.182000
Was present on blacklist at:
2025-06-15 21:15
Spamhaus XBL CBL
144.172.101.224 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.
Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed:
secondary (DNSBL) (
feed detail page)
Last checked at:
2025-07-11 06:40:10.624000
Was present on blacklist at:
2025-06-20 06:40
- Warden events (473)
- 2025-06-14
-
-
ReconScanning (node.368407): 76
-
ReconScanning (node.4dc198): 105
-
AnomalyTraffic (node.ffe95c): 12
-
AnomalyTraffic (node.86dac8): 1
- 2025-06-13
-
-
ReconScanning (node.4dc198): 140
-
ReconScanning (node.368407): 139
- DShield reports (IP summary, reports)
- 2025-06-13
- Number of reports: 1546
- Distinct targets: 324
- 2025-06-14
- Number of reports: 1111
- Distinct targets: 396
- Origin AS
- AS14956 - ROUTERHOSTING
- BGP Prefix
- 144.172.101.0/24
- geo
-
United States, Las Vegas
- 🕑 America/Los_Angeles
- hostname
- 224.101.172.144.static.cloudzy.com
- hostname_class
- ['ip_in_hostname', 'static']
- Address block ('inetnum' or 'NetRange' in whois database)
- 144.172.64.0 - 144.172.127.255
- last_activity
- 2025-06-14 13:11:49
- last_warden_event
- 2025-06-14 13:11:49
- rep
- 0.0
- reserved_range
- 0
- Shodan's InternetDB
- Open ports: 22
- Tags: –
- CPEs: cpe:/o:linux:linux_kernel, cpe:/a:openbsd:openssh:9.2p1, cpe:/o:debian:debian_linux
- ts_added
- 2025-06-13 06:40:05.024000
- ts_last_update
- 2025-07-12 04:01:14.786000
Warden event timeline
DShield event timeline
Presence on blacklists