IP address


--178.16.55.129
Shodan(more info)
Passive DNS
Tags:
IP blacklists
UCEPROTECT L1
178.16.55.129 is listed on the UCEPROTECT L1 blacklist.

Description: UCEPROTECT-NETWORK list of spam IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-10-19 07:45:00.603000
Was present on blacklist at: 2025-10-12 23:45, 2025-10-13 07:45, 2025-10-13 15:45, 2025-10-13 23:45, 2025-10-14 07:45, 2025-10-14 15:45, 2025-10-14 23:45, 2025-10-15 07:45, 2025-10-15 15:45, 2025-10-15 23:45, 2025-10-16 07:45, 2025-10-16 15:45, 2025-10-16 23:45, 2025-10-17 07:45, 2025-10-17 15:45, 2025-10-17 23:45, 2025-10-18 07:45, 2025-10-18 15:45, 2025-10-18 23:45, 2025-10-19 07:45
Spamhaus SBL
178.16.55.129 is listed on the Spamhaus SBL blacklist.

Description: The Spamhaus Block List ("SBL") Advisory is a database of IP addresses from which Spamhaus does not recommend the acceptance of electronic mail.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-10-13 00:57:49.968000
Was present on blacklist at: 2025-10-13 00:57
Spamhaus SBL CSS
178.16.55.129 is listed on the Spamhaus SBL CSS blacklist.

Description: The Spamhaus CSS is part of the SBL. CSS listings will have return code 127.0.0.3 to differentiate from regular SBL listings, which have return code 127.0.0.2.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-10-13 00:57:49.968000
Was present on blacklist at: 2025-10-13 00:57
Spamhaus XBL CBL
178.16.55.129 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-10-13 00:57:49.968000
Was present on blacklist at: 2025-10-13 00:57
Spamhaus DROP
178.16.55.129 is listed on the Spamhaus DROP blacklist.

Description: Spamhaus DROP (Don't Route Or Peer) list. Netblocks controlled by spammers or cyber criminals. The DROP lists are a tiny subset of the SBL, designed for use by firewalls and routing equipment to filter out the malicious traffic from these netblocks.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-10-13 00:57:49.968000
Was present on blacklist at: 2025-10-13 00:57
Origin AS
AS209800 - metaspinner-asn
AS214943 - RAILNET
BGP Prefix
178.16.55.0/24
geo
United States, New York
🕑 America/New_York
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
178.16.48.0 - 178.16.55.255
reserved_range
0
Shodan's InternetDB
Open ports: 80, 135, 139, 445, 3389, 5985
Tags: self-signed
CPEs: cpe:/o:microsoft:windows, cpe:/a:microsoft:internet_information_services:10.0
ts_added
2025-10-13 00:57:49.772000
ts_last_update
2025-10-19 07:51:44.539000

Warden event timeline

DShield event timeline

Presence on blacklists