IP address


.700174.138.40.66prod-boron-nyc1-34.do.binaryedge.ninja
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
CI Army
174.138.40.66 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2024-04-27 02:50:01.035000
Was present on blacklist at: 2024-03-23 03:50, 2024-03-24 03:50, 2024-03-25 03:50, 2024-03-26 03:50, 2024-03-27 03:50, 2024-03-28 03:50, 2024-03-29 03:50, 2024-03-30 03:50, 2024-03-31 02:50, 2024-04-01 02:50, 2024-04-04 02:50, 2024-04-07 02:50, 2024-04-09 02:50, 2024-04-10 02:50, 2024-04-15 02:50, 2024-04-17 02:50, 2024-04-19 02:50, 2024-04-20 02:50, 2024-04-21 02:50, 2024-04-22 02:50, 2024-04-23 02:50, 2024-04-25 02:50, 2024-04-26 02:50, 2024-04-27 02:50
DataPlane VNC RFB
174.138.40.66 is listed on the DataPlane VNC RFB blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs initiating<br>a VNC remote frame buffer (RFB) session to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2024-04-23 22:10:00.706000
Was present on blacklist at: 2024-04-02 10:10, 2024-04-02 14:10, 2024-04-02 18:10, 2024-04-02 22:10, 2024-04-03 02:10, 2024-04-03 06:10, 2024-04-03 10:10, 2024-04-03 14:10, 2024-04-03 18:10, 2024-04-03 22:10, 2024-04-04 02:10, 2024-04-04 06:10, 2024-04-04 10:10, 2024-04-04 14:10, 2024-04-04 18:10, 2024-04-04 22:10, 2024-04-05 02:10, 2024-04-05 06:10, 2024-04-05 10:10, 2024-04-05 14:10, 2024-04-05 18:10, 2024-04-05 22:10, 2024-04-06 02:10, 2024-04-06 06:10, 2024-04-06 10:10, 2024-04-06 14:10, 2024-04-06 18:10, 2024-04-06 22:10, 2024-04-07 02:10, 2024-04-07 06:10, 2024-04-07 10:10, 2024-04-07 14:10, 2024-04-07 18:10, 2024-04-07 22:10, 2024-04-08 02:10, 2024-04-08 06:10, 2024-04-08 10:10, 2024-04-08 14:10, 2024-04-08 18:10, 2024-04-08 22:10, 2024-04-09 02:10, 2024-04-09 06:10, 2024-04-09 10:10, 2024-04-09 14:10, 2024-04-09 18:10, 2024-04-09 22:10, 2024-04-10 02:10, 2024-04-10 06:10, 2024-04-10 10:10, 2024-04-10 14:10, 2024-04-10 18:10, 2024-04-17 10:10, 2024-04-17 14:10, 2024-04-17 18:10, 2024-04-17 22:10, 2024-04-18 02:10, 2024-04-18 06:10, 2024-04-18 10:10, 2024-04-18 14:10, 2024-04-18 18:10, 2024-04-18 22:10, 2024-04-19 02:10, 2024-04-19 06:10, 2024-04-19 10:10, 2024-04-19 14:10, 2024-04-19 18:10, 2024-04-19 22:10, 2024-04-20 02:10, 2024-04-20 06:10, 2024-04-20 10:10, 2024-04-20 14:10, 2024-04-20 18:10, 2024-04-20 22:10, 2024-04-21 02:10, 2024-04-21 06:10, 2024-04-21 10:10, 2024-04-21 14:10, 2024-04-21 18:10, 2024-04-21 22:10, 2024-04-22 02:10, 2024-04-22 06:10, 2024-04-22 10:10, 2024-04-22 14:10, 2024-04-22 18:10, 2024-04-22 22:10, 2024-04-23 02:10, 2024-04-23 06:10, 2024-04-23 10:10, 2024-04-23 14:10, 2024-04-23 18:10, 2024-04-23 22:10
DataPlane SSH conn
174.138.40.66 is listed on the DataPlane SSH conn blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IP addresses that<br>has been seen initiating an SSH connection to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2024-04-22 18:10:03.119000
Was present on blacklist at: 2024-04-16 02:10, 2024-04-16 06:10, 2024-04-16 14:10, 2024-04-16 18:10, 2024-04-17 02:10, 2024-04-17 06:10, 2024-04-17 18:10, 2024-04-18 02:10, 2024-04-18 06:10, 2024-04-18 14:10, 2024-04-18 18:10, 2024-04-19 02:10, 2024-04-19 06:10, 2024-04-19 14:10, 2024-04-19 18:10, 2024-04-20 02:10, 2024-04-20 06:10, 2024-04-20 14:10, 2024-04-20 18:10, 2024-04-21 02:10, 2024-04-21 06:10, 2024-04-21 14:10, 2024-04-21 18:10, 2024-04-22 02:10, 2024-04-22 06:10, 2024-04-22 14:10, 2024-04-22 18:10
DataPlane TELNET login
174.138.40.66 is listed on the DataPlane TELNET login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs performing<br>login via TELNET password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2024-04-23 14:10:03.036000
Was present on blacklist at: 2024-04-16 18:10, 2024-04-16 22:10, 2024-04-17 02:10, 2024-04-17 06:10, 2024-04-17 10:10, 2024-04-17 14:10, 2024-04-17 18:10, 2024-04-17 22:10, 2024-04-18 02:10, 2024-04-18 06:10, 2024-04-18 10:10, 2024-04-18 14:10, 2024-04-18 18:10, 2024-04-18 22:10, 2024-04-19 02:10, 2024-04-19 06:10, 2024-04-19 10:10, 2024-04-19 14:10, 2024-04-19 18:10, 2024-04-19 22:10, 2024-04-20 02:10, 2024-04-20 06:10, 2024-04-20 10:10, 2024-04-20 14:10, 2024-04-20 18:10, 2024-04-20 22:10, 2024-04-21 02:10, 2024-04-21 06:10, 2024-04-21 10:10, 2024-04-21 14:10, 2024-04-21 18:10, 2024-04-21 22:10, 2024-04-22 02:10, 2024-04-22 06:10, 2024-04-22 10:10, 2024-04-22 14:10, 2024-04-22 18:10, 2024-04-22 22:10, 2024-04-23 02:10, 2024-04-23 06:10, 2024-04-23 10:10, 2024-04-23 14:10
Turris greylist
174.138.40.66 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2024-04-17 21:15:00.156000
Was present on blacklist at: 2024-04-16 21:15, 2024-04-17 21:15
Spamhaus XBL CBL
174.138.40.66 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2024-04-25 20:06:10.069000
Was present on blacklist at: 2024-04-18 20:06
AbuseIPDB
174.138.40.66 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>IPs performing malicious activity(DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2024-04-23 04:00:00.565000
Was present on blacklist at: 2024-04-21 04:00, 2024-04-23 04:00
Warden events (1049)
2024-04-27
ReconScanning (node.7d83c0): 14
2024-04-26
ReconScanning (node.7d83c0): 34
ReconScanning (node.bd32ad): 23
2024-04-25
ReconScanning (node.bd32ad): 40
ReconScanning (node.7d83c0): 32
2024-04-24
ReconScanning (node.7d83c0): 37
ReconScanning (node.bd32ad): 23
2024-04-23
ReconScanning (node.bd32ad): 13
ReconScanning (node.7d83c0): 21
2024-04-22
ReconScanning (node.bd32ad): 30
ReconScanning (node.7d83c0): 29
2024-04-21
ReconScanning (node.7d83c0): 36
ReconScanning (node.bd32ad): 51
2024-04-20
ReconScanning (node.7d83c0): 30
ReconScanning (node.bd32ad): 15
2024-04-19
ReconScanning (node.7d83c0): 36
ReconScanning (node.bd32ad): 37
2024-04-18
ReconScanning (node.7d83c0): 23
ReconScanning (node.bd32ad): 10
2024-04-17
ReconScanning (node.7d83c0): 17
2024-04-16
ReconScanning (node.7d83c0): 19
2024-04-15
ReconScanning (node.7d83c0): 25
ReconScanning (node.bd32ad): 1
2024-04-14
ReconScanning (node.7d83c0): 19
ReconScanning (node.bd32ad): 8
2024-04-13
ReconScanning (node.7d83c0): 8
ReconScanning (node.bd32ad): 12
2024-04-12
ReconScanning (node.7d83c0): 2
2024-04-11
ReconScanning (node.7d83c0): 3
2024-04-10
ReconScanning (node.7d83c0): 2
2024-04-08
ReconScanning (node.7d83c0): 6
2024-04-07
ReconScanning (node.7d83c0): 6
ReconScanning (node.bd32ad): 4
2024-04-06
ReconScanning (node.7d83c0): 8
ReconScanning (node.bd32ad): 2
2024-04-05
ReconScanning (node.7d83c0): 24
2024-04-04
ReconScanning (node.7d83c0): 20
2024-04-03
ReconScanning (node.7d83c0): 4
2024-04-02
ReconScanning (node.7d83c0): 15
2024-04-01
ReconScanning (node.7d83c0): 27
ReconScanning (node.bd32ad): 2
2024-03-31
ReconScanning (node.7d83c0): 19
ReconScanning (node.bd32ad): 8
2024-03-30
ReconScanning (node.7d83c0): 17
2024-03-29
ReconScanning (node.7d83c0): 15
ReconScanning (node.bd32ad): 19
2024-03-28
ReconScanning (node.7d83c0): 21
ReconScanning (node.bd32ad): 4
2024-03-27
ReconScanning (node.7d83c0): 23
ReconScanning (node.bd32ad): 1
2024-03-26
ReconScanning (node.7d83c0): 29
ReconScanning (node.bd32ad): 6
2024-03-25
ReconScanning (node.7d83c0): 23
2024-03-24
ReconScanning (node.7d83c0): 28
2024-03-23
ReconScanning (node.7d83c0): 28
2024-03-22
ReconScanning (node.7d83c0): 34
ReconScanning (node.bd32ad): 3
2024-03-21
ReconScanning (node.bd32ad): 1
ReconScanning (node.7d83c0): 2
DShield reports (IP summary, reports)
2024-03-22
Number of reports: 19
Distinct targets: 18
2024-03-23
Number of reports: 14
Distinct targets: 10
2024-03-24
Number of reports: 15
Distinct targets: 12
2024-03-25
Number of reports: 20
Distinct targets: 15
2024-03-26
Number of reports: 18
Distinct targets: 14
2024-03-27
Number of reports: 12
Distinct targets: 12
2024-03-28
Number of reports: 11
Distinct targets: 8
2024-03-30
Number of reports: 194
Distinct targets: 11
2024-03-31
Number of reports: 11
Distinct targets: 10
2024-04-01
Number of reports: 26
Distinct targets: 20
2024-04-02
Number of reports: 18
Distinct targets: 11
2024-04-04
Number of reports: 15
Distinct targets: 11
2024-04-05
Number of reports: 19
Distinct targets: 16
2024-04-15
Number of reports: 37
Distinct targets: 23
2024-04-16
Number of reports: 58
Distinct targets: 18
2024-04-17
Number of reports: 12
Distinct targets: 10
2024-04-18
Number of reports: 14
Distinct targets: 11
2024-04-19
Number of reports: 41
Distinct targets: 29
2024-04-21
Number of reports: 28
Distinct targets: 20
2024-04-22
Number of reports: 17
Distinct targets: 14
2024-04-23
Number of reports: 19
Distinct targets: 16
2024-04-24
Number of reports: 25
Distinct targets: 23
2024-04-25
Number of reports: 21
Distinct targets: 15
2024-04-26
Number of reports: 44
Distinct targets: 30
OTX pulses
[606d75c11c08ff94089a9430] 2021-04-07 09:05:05.353000 | Georgs Honeypot
Author name:georgengelmann
Pulse modified:2024-04-27 07:59:10.746000
Indicator created:2024-04-06 12:08:04
Indicator role:bruteforce
Indicator title:RDP intrusion attempt from prod-boron-nyc1-34.do.binaryedge.ninja port 44476
Indicator expiration:2024-05-06 12:00:00
Origin AS
AS14061 - DIGITALOCEAN-ASN
BGP Prefix
174.138.32.0/20
geo
United States, North Bergen
🕑 America/New_York
hostname
prod-boron-nyc1-34.do.binaryedge.ninja
Address block ('inetnum' or 'NetRange' in whois database)
174.138.0.0 - 174.138.127.255
last_activity
2024-04-27 09:02:51
last_warden_event
2024-04-27 09:02:51
rep
0.6999957584199451
reserved_range
0
Shodan's InternetDB
Open ports: 22, 80
Tags: cloud
CPEs: cpe:/a:openbsd:openssh
ts_added
2024-03-21 20:06:04.947000
ts_last_update
2024-04-27 09:19:46.303000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses