IP address
Shodan(more info)
Passive DNS
Tags:
- IP blacklists
- Spamhaus SBL CSS170.64.159.129 was recently listed on the Spamhaus SBL CSS blacklist, but currently it is not.Spamhaus XBL CBL
Description: The Spamhaus CSS is part of the SBL. CSS listings will have return code 127.0.0.3 to differentiate from regular SBL listings, which have return code 127.0.0.2.
Type of feed: secondary (DNSBL) (feed detail page)
Last checked at: 2024-05-15 16:11:20.272000
Was present on blacklist at: 2024-04-24 16:11170.64.159.129 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.DataPlane SSH login
Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)
Last checked at: 2024-05-15 16:11:20.272000
Was present on blacklist at: 2024-04-24 16:11170.64.159.129 is listed on the DataPlane SSH login blacklist.blocklist.de SIP
Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs performing<br>login to a host using SSH password authentication.
Type of feed: primary (feed detail page)
Last checked at: 2024-05-02 10:10:01.842000
Was present on blacklist at: 2024-04-24 18:10, 2024-04-24 22:10, 2024-04-25 02:10, 2024-04-25 06:10, 2024-04-25 10:10, 2024-04-25 14:10, 2024-04-25 18:10, 2024-04-25 22:10, 2024-04-26 02:10, 2024-04-26 06:10, 2024-04-26 10:10, 2024-04-26 14:10, 2024-04-26 18:10, 2024-04-26 22:10, 2024-04-27 02:10, 2024-04-27 06:10, 2024-04-27 10:10, 2024-04-27 14:10, 2024-04-27 18:10, 2024-04-27 22:10, 2024-04-28 02:10, 2024-04-28 06:10, 2024-04-28 10:10, 2024-04-28 14:10, 2024-04-28 18:10, 2024-04-28 22:10, 2024-04-29 02:10, 2024-04-29 06:10, 2024-04-29 10:10, 2024-04-29 14:10, 2024-04-29 18:10, 2024-04-29 22:10, 2024-04-30 02:10, 2024-04-30 06:10, 2024-04-30 10:10, 2024-04-30 14:10, 2024-04-30 18:10, 2024-04-30 22:10, 2024-05-01 02:10, 2024-05-01 06:10, 2024-05-01 10:10, 2024-05-01 14:10, 2024-05-01 18:10, 2024-05-01 22:10, 2024-05-02 02:10, 2024-05-02 06:10, 2024-05-02 10:10170.64.159.129 is listed on the blocklist.de SIP blacklist.DataPlane SSH conn
Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IP addresses that tried to login in a SIP,<br>VOIP or Asterisk Server.
Type of feed: primary (feed detail page)
Last checked at: 2024-04-24 22:05:05.151000
Was present on blacklist at: 2024-04-24 22:05170.64.159.129 is listed on the DataPlane SSH conn blacklist.BruteForceBlocker
Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IP addresses that<br>has been seen initiating an SSH connection to a remote host.
Type of feed: primary (feed detail page)
Last checked at: 2024-04-29 06:10:01.937000
Was present on blacklist at: 2024-04-25 02:10, 2024-04-25 06:10, 2024-04-25 14:10, 2024-04-25 18:10, 2024-04-27 18:10, 2024-04-28 06:10, 2024-04-28 14:10, 2024-04-28 18:10, 2024-04-29 02:10, 2024-04-29 06:10170.64.159.129 is listed on the BruteForceBlocker blacklist.AbuseIPDB
Description: Daniel Gerzo's BruteForceBlocker. The list is made by perl script,<br>that works along with pf - OpenBSD's firewall and it's main<br>purpose is to block SSH bruteforce attacks via firewall.
Type of feed: primary (feed detail page)
Last checked at: 2024-05-18 02:52:00.330000
Was present on blacklist at: 2024-04-25 02:52, 2024-04-26 02:52, 2024-04-27 02:52, 2024-04-28 02:52, 2024-04-29 02:52, 2024-04-30 02:52, 2024-05-01 02:52, 2024-05-02 02:52, 2024-05-03 02:52, 2024-05-04 02:52, 2024-05-05 02:52, 2024-05-06 02:52, 2024-05-07 02:52, 2024-05-08 02:52, 2024-05-09 02:52, 2024-05-10 02:52, 2024-05-11 02:52, 2024-05-12 02:52, 2024-05-13 02:52, 2024-05-14 02:52, 2024-05-15 02:52, 2024-05-16 02:52, 2024-05-17 02:52, 2024-05-18 02:52170.64.159.129 is listed on the AbuseIPDB blacklist.blocklist.de SSH
Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>IPs performing malicious activity(DDoS, spam, phishing...)
Type of feed: primary (feed detail page)
Last checked at: 2024-04-25 04:00:00.500000
Was present on blacklist at: 2024-04-25 04:00170.64.159.129 is listed on the blocklist.de SSH blacklist.FireHOL anonymizers
Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)
Last checked at: 2024-04-27 10:05:05.425000
Was present on blacklist at: 2024-04-25 04:05, 2024-04-25 10:05, 2024-04-25 16:05, 2024-04-25 22:05, 2024-04-26 04:05, 2024-04-26 10:05, 2024-04-26 16:05, 2024-04-26 22:05, 2024-04-27 04:05, 2024-04-27 10:05170.64.159.129 is listed on the FireHOL anonymizers blacklist.
Description: List of anonymizing IPs, aggregated from multiple lists by FireHOL.
Type of feed: secondary (feed detail page)
Last checked at: 2024-05-17 18:06:07
Was present on blacklist at: 2024-05-01 18:06, 2024-05-02 18:06, 2024-05-03 18:06, 2024-05-04 18:06, 2024-05-05 18:06, 2024-05-06 18:06, 2024-05-07 18:06, 2024-05-08 18:06, 2024-05-09 18:05, 2024-05-10 18:06, 2024-05-11 18:06, 2024-05-12 18:06, 2024-05-13 18:07, 2024-05-14 18:06, 2024-05-15 18:06, 2024-05-16 18:06, 2024-05-17 18:06 - Warden events (8)
- 2024-04-24
-
- ReconScanning (node.7d83c0): 2
- ReconScanning (node.bd32ad): 3
- ReconScanning (node.8cbf96): 3
- DShield reports (IP summary, reports)
- 2024-04-24
- Number of reports: 151
- Distinct targets: 4
- Origin AS
- AS14061 - DIGITALOCEAN-ASN
- BGP Prefix
- 170.64.128.0/18
- geo
- Australia, Sydney
- 🕑 Australia/Sydney
- hostname
- (null)
- Address block ('inetnum' or 'NetRange' in whois database)
- 170.64.128.0 - 170.64.255.255
- last_activity
- 2024-04-24 16:22:59
- last_warden_event
- 2024-04-24 16:22:59
- rep
- 0.0
- reserved_range
- 0
- ts_added
- 2024-04-24 16:11:19.337000
- ts_last_update
- 2024-05-18 02:52:17.921000