IP address


--219.164.210.48i219-164-210-48.s30.a048.ap.plala.or.jp
Shodan(more info)
Passive DNS
Tags: IP in hostname
IP blacklists
Spamhaus XBL CBL
219.164.210.48 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2024-11-01 05:03:12.804000
Was present on blacklist at: 2024-09-27 05:02, 2024-10-04 05:03, 2024-10-11 05:03
Turris greylist
219.164.210.48 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2024-10-07 21:15:00.256000
Was present on blacklist at: 2024-09-28 21:15, 2024-09-29 21:15, 2024-09-30 21:15, 2024-10-01 21:15, 2024-10-02 21:15, 2024-10-03 21:15, 2024-10-04 21:15, 2024-10-05 21:15, 2024-10-06 21:15, 2024-10-07 21:15
Mirai tracker
219.164.210.48 is listed on the Mirai tracker blacklist.

Description: IPs scanning the internet in a specific way known to be used by Mirai malware and its variants.
Type of feed: primary (feed detail page)

Last checked at: 2024-10-03 23:40:01.197000
Was present on blacklist at: 2024-09-29 23:40, 2024-09-30 23:40, 2024-10-01 23:40, 2024-10-02 23:40, 2024-10-03 23:40
AbuseIPDB
219.164.210.48 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2024-10-02 04:00:00.682000
Was present on blacklist at: 2024-10-02 04:00
DShield reports (IP summary, reports)
2024-09-26
Number of reports: 16
Distinct targets: 11
2024-09-27
Number of reports: 30
Distinct targets: 20
2024-09-28
Number of reports: 44
Distinct targets: 27
2024-09-29
Number of reports: 50
Distinct targets: 28
2024-09-30
Number of reports: 33
Distinct targets: 23
2024-10-01
Number of reports: 25
Distinct targets: 15
2024-10-02
Number of reports: 36
Distinct targets: 25
2024-10-03
Number of reports: 24
Distinct targets: 17
2024-10-04
Number of reports: 37
Distinct targets: 21
2024-10-05
Number of reports: 22
Distinct targets: 15
2024-10-06
Number of reports: 34
Distinct targets: 19
OTX pulses
[606d75c11c08ff94089a9430] 2021-04-07 09:05:05.353000 | Georgs Honeypot
Author name:georgengelmann
Pulse modified:2024-10-27 15:01:49.490000
Indicator created:2024-09-27 16:19:03
Indicator role:bruteforce
Indicator title:Telnet intrusion attempt from i219-164-210-48.s30.a048.ap.plala.or.jp port 55386
Indicator expiration:2024-10-27 16:00:00
Origin AS
AS4713 - OCN
BGP Prefix
219.160.0.0/13
geo
Japan, Kagoshima
🕑 Asia/Tokyo
hostname
i219-164-210-48.s30.a048.ap.plala.or.jp
hostname_class
['ip_in_hostname']
Address block ('inetnum' or 'NetRange' in whois database)
219.164.0.0 - 219.165.255.255
last_activity
2024-10-27 16:38:21.651000
reserved_range
0
Shodan's InternetDB
Open ports: 1723
Tags: vpn
CPEs:
ts_added
2024-09-27 05:02:44.067000
ts_last_update
2024-11-05 05:03:21.865000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses