IP address
Tags:
Static IP
IP in hostname
- IP blacklists
DataPlane SSH login
144.172.107.209 is listed on the DataPlane SSH login blacklist.
Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed:
primary (
feed detail page)
Last checked at:
2025-12-11 07:10:01.731000
Was present on blacklist at:
2025-12-05 19:10,
2025-12-06 03:10,
2025-12-06 07:10,
2025-12-06 15:10,
2025-12-06 19:10,
2025-12-07 03:10,
2025-12-07 07:10,
2025-12-07 15:10,
2025-12-07 19:10,
2025-12-08 03:10,
2025-12-08 07:10,
2025-12-08 15:10,
2025-12-08 19:10,
2025-12-09 03:10,
2025-12-09 07:10,
2025-12-09 15:10,
2025-12-09 19:10,
2025-12-10 03:10,
2025-12-10 07:10,
2025-12-10 15:10,
2025-12-10 19:10,
2025-12-11 03:10,
2025-12-11 07:10
blocklist.de SSH
144.172.107.209 is listed on the blocklist.de SSH blacklist.
Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed:
primary (
feed detail page)
Last checked at:
2025-12-06 05:05:00.522000
Was present on blacklist at:
2025-12-05 23:05,
2025-12-06 05:05
AbuseIPDB
144.172.107.209 is listed on the AbuseIPDB blacklist.
Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed:
primary (
feed detail page)
Last checked at:
2025-12-06 05:00:00.615000
Was present on blacklist at:
2025-12-06 05:00
blocklist.de web-login
144.172.107.209 is listed on the blocklist.de web-login blacklist.
Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed:
primary (
feed detail page)
Last checked at:
2025-12-08 05:05:00.446000
Was present on blacklist at:
2025-12-06 11:05,
2025-12-06 17:05,
2025-12-06 23:05,
2025-12-07 05:05,
2025-12-07 11:05,
2025-12-07 17:05,
2025-12-07 23:05,
2025-12-08 05:05
blocklist.de Apache
144.172.107.209 is listed on the blocklist.de Apache blacklist.
Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed:
primary (
feed detail page)
Last checked at:
2025-12-08 05:05:00.718000
Was present on blacklist at:
2025-12-06 11:05,
2025-12-06 17:05,
2025-12-06 23:05,
2025-12-07 05:05,
2025-12-07 11:05,
2025-12-07 17:05,
2025-12-07 23:05,
2025-12-08 05:05
- DShield reports (IP summary, reports)
- 2025-12-05
- Number of reports: 85
- Distinct targets: 3
- 2025-12-06
- Number of reports: 231
- Distinct targets: 8
- 2025-12-07
- Number of reports: 231
- Distinct targets: 8
- Origin AS
- AS14956 - ROUTERHOSTING
- BGP Prefix
- 144.172.107.0/24
- geo
-
United States, Ogden
- 🕑 America/Denver
- hostname
- 209.107.172.144.static.cloudzy.com
- hostname_class
- ['ip_in_hostname', 'static']
- Address block ('inetnum' or 'NetRange' in whois database)
- 144.172.64.0 - 144.172.127.255
- reserved_range
- 0
- Shodan's InternetDB
- Open ports: 22, 465, 993, 3389
- Tags: self-signed
- CPEs: cpe:/a:openbsd:openssh:9.6p1, cpe:/a:postfix:postfix, cpe:/o:canonical:ubuntu_linux
- ts_added
- 2025-12-05 19:17:35.712000
- ts_last_update
- 2025-12-11 07:17:35.099000
Warden event timeline
DShield event timeline
Presence on blacklists