IP address


.03131.220.104.199srv742139.hstgr.cloud
Shodan(more info)
Passive DNS
Tags:
IP blacklists
blocklist.de SSH
31.220.104.199 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-10-17 10:05:00.374000
Was present on blacklist at: 2025-10-09 22:05, 2025-10-10 04:05, 2025-10-10 10:05, 2025-10-10 22:05, 2025-10-11 04:05, 2025-10-11 10:05, 2025-10-14 16:05, 2025-10-14 22:05, 2025-10-15 04:05, 2025-10-15 10:05, 2025-10-15 16:05, 2025-10-15 22:05, 2025-10-16 04:05, 2025-10-16 10:05, 2025-10-16 16:05, 2025-10-16 22:05, 2025-10-17 04:05, 2025-10-17 10:05
AbuseIPDB
31.220.104.199 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-10-16 04:00:00.892000
Was present on blacklist at: 2025-10-16 04:00
Warden events (3)
2025-10-09
AttemptLogin (node.ce2b59): 1
IntrusionUserCompromise (node.40929a): 2
Origin AS
AS47583 - AS-HOSTINGER
BGP Prefix
31.220.104.0/24
geo
United States, Phoenix
🕑 America/Phoenix
hostname
srv742139.hstgr.cloud
Address block ('inetnum' or 'NetRange' in whois database)
31.220.104.0 - 31.220.111.255
last_activity
2025-10-09 19:21:26.773000
last_warden_event
2025-10-09 19:21:26.773000
rep
0.03125
reserved_range
0
Shodan's InternetDB
Open ports: 22, 80, 443, 3000, 8443
Tags: self-signed
CPEs: cpe:/a:nodejs:node.js, cpe:/a:f5:nginx, cpe:/a:expressjs:express, cpe:/a:openbsd:openssh:9.6p1, cpe:/a:jquery:jquery, cpe:/o:canonical:ubuntu_linux, cpe:/a:getbootstrap:bootstrap
ts_added
2025-10-09 22:50:31.065000
ts_last_update
2025-10-18 22:50:40.232000

Warden event timeline

DShield event timeline

Presence on blacklists