IP address


.240216.132.105.150
Shodan(more info)
Passive DNS
Tags: Login attempts
IP blacklists
Blocklist.net.ua
216.132.105.150 is listed on the Blocklist.net.ua blacklist.

Description: BlockList contains IP addresses that perform attacks,<br>send spam or brute force passwords to the blocking list.
Type of feed: primary (feed detail page)

Last checked at: 2026-01-18 03:15:03.584000
Was present on blacklist at: 2026-01-11 11:15, 2026-01-11 15:15, 2026-01-11 19:15, 2026-01-11 23:15, 2026-01-12 03:15, 2026-01-12 07:15, 2026-01-13 23:15, 2026-01-14 03:15, 2026-01-14 07:15, 2026-01-14 11:15, 2026-01-14 15:15, 2026-01-14 19:15, 2026-01-15 15:15, 2026-01-15 19:15, 2026-01-15 23:15, 2026-01-16 03:15, 2026-01-16 07:15, 2026-01-16 11:15, 2026-01-16 15:15, 2026-01-16 19:15, 2026-01-16 23:15, 2026-01-17 03:15, 2026-01-17 07:15, 2026-01-17 11:15, 2026-01-17 15:15, 2026-01-17 19:15, 2026-01-17 23:15, 2026-01-18 03:15
blocklist.de SSH
216.132.105.150 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-01-14 23:05:00.370000
Was present on blacklist at: 2026-01-13 05:05, 2026-01-13 11:05, 2026-01-13 17:05, 2026-01-13 23:05, 2026-01-14 05:05, 2026-01-14 11:05, 2026-01-14 17:05, 2026-01-14 23:05
DataPlane SSH login
216.132.105.150 is listed on the DataPlane SSH login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2026-01-18 03:10:08.209000
Was present on blacklist at: 2026-01-16 15:10, 2026-01-16 19:10, 2026-01-17 03:10, 2026-01-17 07:10, 2026-01-17 15:10, 2026-01-17 19:10, 2026-01-18 03:10
DataPlane SSH conn
216.132.105.150 is listed on the DataPlane SSH conn blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IP addresses that<br>has been seen initiating an unsolicited SSH connection to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2026-01-18 03:10:08.502000
Was present on blacklist at: 2026-01-16 15:10, 2026-01-16 19:10, 2026-01-17 03:10, 2026-01-17 07:10, 2026-01-17 15:10, 2026-01-17 19:10, 2026-01-18 03:10
Warden events (132)
2026-01-17
ReconScanning (node.9c1411): 1
2026-01-16
ReconScanning (node.9c1411): 3
2026-01-15
ReconScanning (node.9c1411): 2
2026-01-14
AttemptLogin (node.70e749): 62
2026-01-11
AttemptLogin (node.368407): 12
AttemptLogin (node.4dc198): 52
Origin AS
AS5065 - BUNNY-COMMUNICATIONS-GLOBAL
BGP Prefix
216.132.105.0/24
geo
United States, Los Angeles
🕑 America/Los_Angeles
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
216.132.0.0 - 216.132.255.255
last_activity
2026-01-17 11:10:07
last_warden_event
2026-01-17 11:10:07
rep
0.23988095238095236
reserved_range
0
ts_added
2026-01-11 11:41:19.553000
ts_last_update
2026-01-18 03:48:24.624000

Warden event timeline

DShield event timeline

Presence on blacklists