IP address


.15936.140.122.122
Shodan(more info)
Passive DNS
Tags: Login attempts Scanner
IP blacklists
UCEPROTECT L1
36.140.122.122 is listed on the UCEPROTECT L1 blacklist.

Description: UCEPROTECT-NETWORK list of spam IPs.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-30 07:45:00.510000
Was present on blacklist at: 2026-04-20 07:45, 2026-04-20 15:45, 2026-04-20 23:45, 2026-04-21 07:45, 2026-04-21 15:45, 2026-04-21 23:45, 2026-04-22 07:45, 2026-04-22 15:45, 2026-04-22 23:45, 2026-04-23 07:45, 2026-04-23 15:45, 2026-04-23 23:45, 2026-04-24 07:45, 2026-04-24 15:45, 2026-04-24 23:45, 2026-04-25 23:45, 2026-04-26 07:45, 2026-04-30 07:45
Spamhaus SBL CSS
36.140.122.122 is listed on the Spamhaus SBL CSS blacklist.

Description: The Spamhaus CSS is part of the SBL. CSS listings will have return code 127.0.0.3 to differentiate from regular SBL listings, which have return code 127.0.0.2.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-04-26 04:00:36.211000
Was present on blacklist at: 2026-04-26 04:00
AbuseIPDB
36.140.122.122 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-04-30 04:00:00.594000
Was present on blacklist at: 2026-04-26 04:00, 2026-04-30 04:00
blocklist.de SSH
36.140.122.122 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-05-01 16:05:00.144000
Was present on blacklist at: 2026-04-28 04:05, 2026-04-28 10:05, 2026-04-28 16:05, 2026-04-28 22:05, 2026-04-29 04:05, 2026-04-29 10:05, 2026-04-29 16:05, 2026-04-29 22:05, 2026-04-30 22:05, 2026-05-01 04:05, 2026-05-01 10:05, 2026-05-01 16:05
Echelon SSH connection attempt
36.140.122.122 is listed on the Echelon SSH connection attempt blacklist.

Description: SSH connection attempt detected on port 22 or 2222
Type of feed: primary (feed detail page)

Last checked at: 2026-05-01 09:35:01.017000
Was present on blacklist at: 2026-05-01 09:35

Threat categories

TLRoleCategoryDetails
59 src scan port: 22
45 src login protocol: ssh
port: 22, 2222
39 src

Warden events (19)
2026-05-01
AttemptLogin (node.c26a5f): 1
2026-04-30
ReconScanning (node.ce2b59): 9
2026-04-25
AttemptLogin (node.368407): 6
2026-04-23
IntrusionUserCompromise (node.40929a): 1
2026-04-21
IntrusionUserCompromise (node.40929a): 1
2026-04-18
IntrusionUserCompromise (node.40929a): 1
DShield reports (IP summary, reports)
2026-04-22
Number of reports: 16
Distinct targets: 3
2026-04-23
Number of reports: 17
Distinct targets: 4
2026-04-29
Number of reports: 16
Distinct targets: 7
2026-04-30
Number of reports: 16
Distinct targets: 7
Origin AS
AS9808 - CMNET-GD
BGP Prefix
36.140.122.0/24
geo
China
🕑 Asia/Shanghai
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
36.128.0.0 - 36.191.255.255
last_activity
2026-05-01 11:23:22.789000
last_warden_event
2026-05-01 11:23:22.789000
rep
0.1588076636904762
reserved_range
0
ts_added
2026-04-19 04:00:20.159000
ts_last_update
2026-05-01 16:09:04.240000

Warden event timeline

DShield event timeline

Presence on blacklists