IP address


.0005.42.104.64halting-hospital.aeza.network
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
Spamhaus SBL
5.42.104.64 is listed on the Spamhaus SBL blacklist.

Description: The Spamhaus Block List ("SBL") Advisory is a database of IP addresses from which Spamhaus does not recommend the acceptance of electronic mail.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2024-09-28 17:01:40.112000
Was present on blacklist at: 2024-09-07 17:01, 2024-09-14 17:01, 2024-09-21 17:01, 2024-09-28 17:01
Spamhaus PBL
5.42.104.64 is listed on the Spamhaus PBL blacklist.

Description: The Spamhaus PBL is a DNSBL database of end-user IP address ranges which should not be delivering unauthenticated SMTP email to any Internet mail server except those provided for specifically by an ISP for that customer's use.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2024-09-28 17:01:40.112000
Was present on blacklist at: 2024-09-07 17:01, 2024-09-14 17:01, 2024-09-21 17:01, 2024-09-28 17:01
CI Army
5.42.104.64 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2024-09-14 02:50:00.981000
Was present on blacklist at: 2024-09-08 02:50, 2024-09-09 02:50, 2024-09-10 02:50, 2024-09-11 02:50, 2024-09-12 02:50, 2024-09-13 02:50, 2024-09-14 02:50
DataPlane TELNET login
5.42.104.64 is listed on the DataPlane TELNET login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login via TELNET password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2024-09-09 02:10:04.710000
Was present on blacklist at: 2024-09-08 02:10, 2024-09-08 06:10, 2024-09-08 14:10, 2024-09-09 02:10
blocklist.de Apache
5.42.104.64 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2024-09-09 22:05:05.443000
Was present on blacklist at: 2024-09-08 04:05, 2024-09-08 10:05, 2024-09-08 16:05, 2024-09-08 22:05, 2024-09-09 04:05, 2024-09-09 10:05, 2024-09-09 16:05, 2024-09-09 22:05
Turris greylist
5.42.104.64 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2024-09-10 21:15:00.201000
Was present on blacklist at: 2024-09-08 21:15, 2024-09-09 21:15, 2024-09-10 21:15
Spamhaus XBL CBL
5.42.104.64 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2024-09-28 17:01:40.112000
Was present on blacklist at: 2024-09-14 17:01
Warden events (84)
2024-09-10
ReconScanning (node.ce2b59): 2
ReconScanning (node.368407): 1
ReconScanning (node.4dc198): 1
2024-09-09
ReconScanning (node.ce2b59): 6
ReconScanning (node.4dc198): 1
2024-09-08
ReconScanning (node.4dc198): 9
ReconScanning (node.368407): 5
ReconScanning (node.ce2b59): 10
2024-09-07
ReconScanning (node.ce2b59): 12
ReconScanning (node.4dc198): 25
ReconScanning (node.368407): 12
DShield reports (IP summary, reports)
2024-09-07
Number of reports: 175
Distinct targets: 66
2024-09-08
Number of reports: 215
Distinct targets: 85
2024-09-09
Number of reports: 94
Distinct targets: 33
2024-09-10
Number of reports: 98
Distinct targets: 72
OTX pulses
[66df030268f10286894db735] 2024-09-09 14:15:30.924000 | Apache honeypot logs for 09/Sep/2024
Author name:jnazario
Pulse modified:2024-09-09 14:15:30.924000
Indicator created:2024-09-09 14:15:31
Indicator role:None
Indicator title:
Indicator expiration:2024-10-09 14:00:00
Origin AS
AS210644 - aeza
BGP Prefix
5.42.104.0/23
geo
Russia
🕑 Europe/Moscow
hostname
halting-hospital.aeza.network
Address block ('inetnum' or 'NetRange' in whois database)
5.42.0.0 - 5.42.127.255
last_activity
2024-09-10 06:23:59
last_warden_event
2024-09-10 06:23:59
rep
0.0
reserved_range
0
Shodan's InternetDB
Open ports: 22, 80, 3000, 3389
Tags: self-signed
CPEs: cpe:/a:jivochat:jivochat, cpe:/a:openbsd:openssh
ts_added
2024-09-07 17:01:32.884000
ts_last_update
2024-09-30 17:01:40.170000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses