IP address


.23020.218.139.174
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
Spamhaus XBL CBL
20.218.139.174 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2024-09-22 23:59:41.433000
Was present on blacklist at: 2024-09-15 23:59, 2024-09-22 23:59
AbuseIPDB
20.218.139.174 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2024-09-28 04:00:00.590000
Was present on blacklist at: 2024-09-17 04:00, 2024-09-21 04:00, 2024-09-22 04:00, 2024-09-23 04:00, 2024-09-25 04:00, 2024-09-26 04:00, 2024-09-28 04:00
Turris greylist
20.218.139.174 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2024-09-29 21:15:00.238000
Was present on blacklist at: 2024-09-17 21:15, 2024-09-18 21:15, 2024-09-19 21:15, 2024-09-20 21:15, 2024-09-21 21:15, 2024-09-22 21:15, 2024-09-23 21:15, 2024-09-24 21:15, 2024-09-25 21:15, 2024-09-26 21:15, 2024-09-27 21:15, 2024-09-28 21:15, 2024-09-29 21:15
Mirai tracker
20.218.139.174 is listed on the Mirai tracker blacklist.

Description: IPs scanning the internet in a specific way known to be used by Mirai malware and its variants.
Type of feed: primary (feed detail page)

Last checked at: 2024-09-28 23:40:00.410000
Was present on blacklist at: 2024-09-21 23:40, 2024-09-22 23:40, 2024-09-23 23:40, 2024-09-24 23:40, 2024-09-28 23:40
Warden events (207)
2024-09-29
ReconScanning (node.ce2b59): 24
2024-09-25
ReconScanning (node.ce2b59): 4
2024-09-24
ReconScanning (node.ce2b59): 4
2024-09-22
ReconScanning (node.ce2b59): 4
2024-09-19
ReconScanning (node.ce2b59): 5
2024-09-18
ReconScanning (node.ce2b59): 48
2024-09-17
ReconScanning (node.ce2b59): 47
2024-09-16
ReconScanning (node.ce2b59): 70
2024-09-15
ReconScanning (node.ce2b59): 1
DShield reports (IP summary, reports)
2024-09-16
Number of reports: 148
Distinct targets: 53
2024-09-17
Number of reports: 176
Distinct targets: 68
2024-09-18
Number of reports: 157
Distinct targets: 61
2024-09-19
Number of reports: 174
Distinct targets: 67
2024-09-20
Number of reports: 132
Distinct targets: 62
2024-09-21
Number of reports: 159
Distinct targets: 74
2024-09-22
Number of reports: 167
Distinct targets: 77
2024-09-23
Number of reports: 187
Distinct targets: 68
2024-09-24
Number of reports: 160
Distinct targets: 74
2024-09-25
Number of reports: 147
Distinct targets: 63
2024-09-26
Number of reports: 207
Distinct targets: 82
2024-09-27
Number of reports: 131
Distinct targets: 66
2024-09-28
Number of reports: 167
Distinct targets: 65
OTX pulses
[602bc528f447d628d41494f2] 2021-02-16 13:14:16.945000 | Ka's Honeypot visitors
Author name:Kapppppa
Pulse modified:2024-09-29 19:47:23.811000
Indicator created:2024-09-18 12:24:39
Indicator role:bruteforce
Indicator title:Telnet Login attempt
Indicator expiration:2024-10-18 12:00:00
Origin AS
AS8075 - MICROSOFT-CORP-MSN-AS-BLOCK
BGP Prefix
20.192.0.0/10
geo
Germany, Frankfurt am Main
🕑 Europe/Berlin
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
20.192.0.0 - 20.255.255.255
last_activity
2024-09-29 20:12:54.844000
last_warden_event
2024-09-29 12:35:45
rep
0.2297619047619048
reserved_range
0
Shodan's InternetDB
Open ports: 22, 8080, 8081
Tags: cloud
CPEs: cpe:/a:openbsd:openssh
ts_added
2024-09-15 23:59:38.142000
ts_last_update
2024-09-29 21:15:14.705000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses