IP address


.8082.26.81.183
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
blocklist.de SSH
2.26.81.183 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-10 10:05:00.173000
Was present on blacklist at: 2026-04-08 16:05, 2026-04-08 22:05, 2026-04-09 04:05, 2026-04-09 10:05, 2026-04-09 16:05, 2026-04-09 22:05, 2026-04-10 04:05, 2026-04-10 10:05
AbuseIPDB
2.26.81.183 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-04-16 04:00:00.586000
Was present on blacklist at: 2026-04-09 04:00, 2026-04-10 04:00, 2026-04-11 04:00, 2026-04-12 04:00, 2026-04-13 04:00, 2026-04-14 04:00, 2026-04-16 04:00
UCEPROTECT L1
2.26.81.183 is listed on the UCEPROTECT L1 blacklist.

Description: UCEPROTECT-NETWORK list of spam IPs.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-16 15:45:00.515000
Was present on blacklist at: 2026-04-09 07:45, 2026-04-09 15:45, 2026-04-09 23:45, 2026-04-10 07:45, 2026-04-10 15:45, 2026-04-10 23:45, 2026-04-11 07:45, 2026-04-11 15:45, 2026-04-11 23:45, 2026-04-12 07:45, 2026-04-12 15:45, 2026-04-12 23:45, 2026-04-13 07:45, 2026-04-13 15:45, 2026-04-13 23:45, 2026-04-14 07:45, 2026-04-14 15:45, 2026-04-14 23:45, 2026-04-15 07:45, 2026-04-15 15:45, 2026-04-15 23:45, 2026-04-16 07:45, 2026-04-16 15:45
CI Army
2.26.81.183 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2026-04-16 02:50:00.779000
Was present on blacklist at: 2026-04-10 02:50, 2026-04-11 02:50, 2026-04-12 02:50, 2026-04-13 02:50, 2026-04-14 02:50, 2026-04-15 02:50, 2026-04-16 02:50
FireHOL anonymizers
2.26.81.183 is listed on the FireHOL anonymizers blacklist.

Description: List of anonymizing IPs, aggregated from multiple lists by FireHOL.
Type of feed: secondary (feed detail page)

Last checked at: 2026-04-16 06:05:10
Was present on blacklist at: 2026-04-11 06:05, 2026-04-12 06:05, 2026-04-13 06:05, 2026-04-14 06:05, 2026-04-15 06:05, 2026-04-16 06:05
Echelon SSH connection attempt
2.26.81.183 is listed on the Echelon SSH connection attempt blacklist.

Description: SSH connection attempt detected on port 22 or 2222
Type of feed: primary (feed detail page)

Last checked at: 2026-04-16 09:35:00.719000
Was present on blacklist at: 2026-04-12 09:35, 2026-04-13 09:35, 2026-04-14 09:35, 2026-04-15 09:35, 2026-04-16 09:35
Echelon SSH bruteforce
2.26.81.183 is listed on the Echelon SSH bruteforce blacklist.

Description: Multiple SSH authentication attempts detected
Type of feed: primary (feed detail page)

Last checked at: 2026-04-16 09:35:00.737000
Was present on blacklist at: 2026-04-12 09:35, 2026-04-13 09:35, 2026-04-14 09:35, 2026-04-15 09:35, 2026-04-16 09:35
Spamhaus XBL CBL
2.26.81.183 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-04-15 09:57:12.567000
Was present on blacklist at: 2026-04-15 09:57

Threat categories

TLRoleCategoryDetails
72 src login protocol: ssh, telnet
port: 22, 23, 2222
71 src scan port: 22, 23, 80, 443, 2222, 2375
48 src

Warden events (3367)
2026-04-16
ReconScanning (node.9c1411): 54
ReconScanning (node.ce2b59): 22
IntrusionUserCompromise (node.cfb4f7): 48
2026-04-15
ReconScanning (node.9c1411): 63
ReconScanning (node.ce2b59): 30
AttemptLogin (node.e1f86c): 3
AttemptLogin (node.b17ef8): 5
IntrusionUserCompromise (node.cfb4f7): 2
2026-04-14
ReconScanning (node.9c1411): 72
ReconScanning (node.ce2b59): 30
IntrusionUserCompromise (node.cfb4f7): 16
2026-04-13
ReconScanning (node.9c1411): 72
IntrusionUserCompromise (node.cfb4f7): 141
ReconScanning (node.ce2b59): 31
AttemptLogin (node.9c160c): 1
AttemptLogin (node.b17ef8): 7
IntrusionUserCompromise (node.b17ef8): 1
2026-04-12
ReconScanning (node.9c1411): 73
ReconScanning (node.ce2b59): 29
IntrusionUserCompromise (node.cfb4f7): 163
AttemptLogin (node.d2ecc6): 3
AttemptLogin (node.985fb4): 6
AttemptLogin (node.e1f86c): 1
2026-04-11
ReconScanning (node.9c1411): 68
IntrusionUserCompromise (node.cfb4f7): 537
ReconScanning (node.ce2b59): 30
AttemptLogin (node.9c160c): 1
AttemptLogin (node.b7f4d1): 1
2026-04-10
ReconScanning (node.9c1411): 70
IntrusionUserCompromise (node.cfb4f7): 347
ReconScanning (node.ce2b59): 30
AttemptLogin (node.70e749): 5
IntrusionUserCompromise (node.70e749): 1
AttemptLogin (node.e47683): 2
IntrusionUserCompromise (node.e47683): 1
AttemptLogin (node.03e7a9): 6
IntrusionUserCompromise (node.03e7a9): 1
2026-04-09
ReconScanning (node.9c1411): 49
ReconScanning (node.ce2b59): 31
AttemptLogin (node.03e7a9): 7
IntrusionUserCompromise (node.03e7a9): 2
IntrusionUserCompromise (node.cfb4f7): 744
AttemptLogin (node.eef996): 4
IntrusionUserCompromise (node.eef996): 1
2026-04-08
ReconScanning (node.ce2b59): 27
IntrusionUserCompromise (node.cfb4f7): 482
ReconScanning (node.9c1411): 43
AttemptLogin (node.ce2b59): 3
AttemptLogin (node.40929a): 1
DShield reports (IP summary, reports)
2026-04-08
Number of reports: 223
Distinct targets: 37
2026-04-09
Number of reports: 196
Distinct targets: 44
2026-04-10
Number of reports: 360
Distinct targets: 66
2026-04-11
Number of reports: 306
Distinct targets: 63
2026-04-12
Number of reports: 300
Distinct targets: 69
2026-04-13
Number of reports: 201
Distinct targets: 47
2026-04-14
Number of reports: 274
Distinct targets: 52
2026-04-15
Number of reports: 274
Distinct targets: 52
Origin AS
AS215439 - PLAY2GO-NET
BGP Prefix
2.26.81.0/24
geo
United States
🕑 America/Chicago
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
2.24.0.0 - 2.31.255.255
last_activity
2026-04-16 16:39:51
last_warden_event
2026-04-16 16:39:51
rep
0.8080357142857143
reserved_range
0
ts_added
2026-04-08 09:56:15.299000
ts_last_update
2026-04-16 16:43:19.370000

Warden event timeline

DShield event timeline

Presence on blacklists