IP address


.058220.154.138.116
Shodan(more info)
Passive DNS
Tags: Login attempts
IP blacklists
Spamhaus PBL
220.154.138.116 is listed on the Spamhaus PBL blacklist.

Description: The Spamhaus PBL is a DNSBL database of end-user IP address ranges which should not be delivering unauthenticated SMTP email to any Internet mail server except those provided for specifically by an ISP for that customer's use.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-05-12 09:00:50.780000
Was present on blacklist at: 2026-04-21 09:00, 2026-04-28 09:00, 2026-05-05 09:00, 2026-05-12 09:00
AbuseIPDB
220.154.138.116 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-05-05 04:00:00.599000
Was present on blacklist at: 2026-04-22 04:00, 2026-04-24 04:00, 2026-05-01 04:00, 2026-05-05 04:00
blocklist.de SSH
220.154.138.116 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-28 10:05:00.423000
Was present on blacklist at: 2026-04-23 10:05, 2026-04-23 16:05, 2026-04-23 22:05, 2026-04-24 04:05, 2026-04-28 10:05
blocklist.de FTP
220.154.138.116 is listed on the blocklist.de FTP blacklist.

Description: Blocklist.de feed is a free and voluntary service<br>provided by a Fraud/Abuse-specialist. IPs performing attacks<br>on the Service FTP.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-29 22:05:00.102000
Was present on blacklist at: 2026-04-24 16:05, 2026-04-28 16:05, 2026-04-28 22:05, 2026-04-29 04:05, 2026-04-29 10:05, 2026-04-29 16:05, 2026-04-29 22:05
blocklist.de web-login
220.154.138.116 is listed on the blocklist.de web-login blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)

Last checked at: 2026-05-08 22:05:00.191000
Was present on blacklist at: 2026-04-24 22:05, 2026-04-25 22:05, 2026-04-26 04:05, 2026-04-30 04:05, 2026-04-30 10:05, 2026-04-30 16:05, 2026-04-30 22:05, 2026-05-01 04:05, 2026-05-01 10:05, 2026-05-01 16:05, 2026-05-01 22:05, 2026-05-03 04:05, 2026-05-03 10:05, 2026-05-03 16:05, 2026-05-03 22:05, 2026-05-04 04:05, 2026-05-04 10:05, 2026-05-04 16:05, 2026-05-04 22:05, 2026-05-05 04:05, 2026-05-05 10:05, 2026-05-05 16:05, 2026-05-07 04:05, 2026-05-07 10:05, 2026-05-07 16:05, 2026-05-07 22:05, 2026-05-08 04:05, 2026-05-08 10:05, 2026-05-08 16:05, 2026-05-08 22:05
blocklist.de Apache
220.154.138.116 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-05-08 22:05:05.181000
Was present on blacklist at: 2026-04-24 22:05, 2026-04-25 22:05, 2026-04-26 04:05, 2026-04-30 04:05, 2026-04-30 10:05, 2026-04-30 16:05, 2026-04-30 22:05, 2026-05-01 04:05, 2026-05-01 10:05, 2026-05-01 16:05, 2026-05-01 22:05, 2026-05-03 04:05, 2026-05-03 10:05, 2026-05-03 16:05, 2026-05-03 22:05, 2026-05-04 04:05, 2026-05-04 10:05, 2026-05-04 16:05, 2026-05-04 22:05, 2026-05-05 04:05, 2026-05-05 10:05, 2026-05-05 16:05, 2026-05-07 04:05, 2026-05-07 10:05, 2026-05-07 16:05, 2026-05-07 22:05, 2026-05-08 04:05, 2026-05-08 10:05, 2026-05-08 16:05, 2026-05-08 22:05
Echelon SSH connection attempt
220.154.138.116 is listed on the Echelon SSH connection attempt blacklist.

Description: SSH connection attempt detected on port 22 or 2222
Type of feed: primary (feed detail page)

Last checked at: 2026-05-08 09:35:01.250000
Was present on blacklist at: 2026-04-29 09:35, 2026-04-30 09:35, 2026-05-01 09:35, 2026-05-03 09:35, 2026-05-04 09:35, 2026-05-05 09:35, 2026-05-07 09:35, 2026-05-08 09:35
Echelon SSH bruteforce
220.154.138.116 is listed on the Echelon SSH bruteforce blacklist.

Description: Multiple SSH authentication attempts detected
Type of feed: primary (feed detail page)

Last checked at: 2026-05-08 09:35:01.222000
Was present on blacklist at: 2026-04-29 09:35, 2026-04-30 09:35, 2026-05-01 09:35, 2026-05-03 09:35, 2026-05-04 09:35, 2026-05-05 09:35, 2026-05-07 09:35, 2026-05-08 09:35

Threat categories

TLRoleCategoryDetails
57 src login protocol: ssh
port: 22, 2222
50 src scan
47 src

Warden events (18)
2026-05-04
AttemptLogin (node.28c168): 1
2026-05-03
AttemptLogin (node.b17ef8): 1
AttemptLogin (node.03e7a9): 1
2026-04-30
AttemptLogin (node.03e7a9): 5
AttemptLogin (node.eef996): 3
2026-04-29
AttemptLogin (node.03e7a9): 1
2026-04-27
AttemptLogin (node.03e7a9): 1
2026-04-26
AttemptLogin (node.d2ecc6): 1
AttemptLogin (node.ce2b59): 1
2026-04-24
AttemptLogin (node.03e7a9): 1
2026-04-23
AttemptLogin (node.e47683): 1
2026-04-21
AttemptLogin (node.eef996): 1
DShield reports (IP summary, reports)
2026-04-21
Number of reports: 145
Distinct targets: 10
2026-04-22
Number of reports: 78
Distinct targets: 17
2026-04-23
Number of reports: 303
Distinct targets: 17
2026-04-24
Number of reports: 53
Distinct targets: 14
2026-04-25
Number of reports: 77
Distinct targets: 13
2026-04-26
Number of reports: 135
Distinct targets: 20
2026-04-27
Number of reports: 135
Distinct targets: 20
2026-04-28
Number of reports: 42
Distinct targets: 25
2026-04-29
Number of reports: 184
Distinct targets: 13
2026-04-30
Number of reports: 184
Distinct targets: 13
2026-05-01
Number of reports: 60
Distinct targets: 12
2026-05-02
Number of reports: 81
Distinct targets: 10
2026-05-03
Number of reports: 81
Distinct targets: 10
2026-05-04
Number of reports: 34
Distinct targets: 6
2026-05-05
Number of reports: 166
Distinct targets: 13
2026-05-06
Number of reports: 11
Distinct targets: 5
Origin AS
AS146966 - CHINANET-YANGZHOUNORTH-IDC
BGP Prefix
220.154.138.0/24
geo
China
🕑 Asia/Shanghai
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
220.154.0.0 - 220.154.255.255
last_activity
2026-05-04 21:49:33.677000
last_warden_event
2026-05-04 21:49:33.677000
rep
0.05768229166666667
reserved_range
0
Shodan's InternetDB
Open ports: 22
Tags:
CPEs: cpe:/o:canonical:ubuntu_linux, cpe:/a:openbsd:openssh:8.9p1
ts_added
2026-04-21 09:00:46.326000
ts_last_update
2026-05-12 09:00:50.875000

Warden event timeline

DShield event timeline

Presence on blacklists