IP address


.42251.159.202.57
Shodan(more info)
Passive DNS
Tags:
IP blacklists
blocklist.de SSH
51.159.202.57 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-05-19 04:05:05.087000
Was present on blacklist at: 2026-05-16 22:05, 2026-05-17 04:05, 2026-05-17 10:05, 2026-05-17 16:05, 2026-05-17 22:05, 2026-05-18 04:05, 2026-05-18 10:05, 2026-05-18 16:05, 2026-05-18 22:05, 2026-05-19 04:05
CI Army
51.159.202.57 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2026-05-17 02:50:00.825000
Was present on blacklist at: 2026-05-17 02:50
AbuseIPDB
51.159.202.57 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-05-21 04:00:00.637000
Was present on blacklist at: 2026-05-17 04:00, 2026-05-21 04:00
Echelon telnet bruteforce
51.159.202.57 is listed on the Echelon telnet bruteforce blacklist.

Description: Multiple telnet authentication attempts detected
Type of feed: primary (feed detail page)

Last checked at: 2026-05-22 09:45:00.256000
Was present on blacklist at: 2026-05-18 09:45, 2026-05-19 09:45, 2026-05-20 09:45, 2026-05-21 09:45, 2026-05-22 09:45
Echelon TLS/SSL crawler
51.159.202.57 is listed on the Echelon TLS/SSL crawler blacklist.

Description: TLS/SSL connection fingerprinting detected via Suricata
Type of feed: primary (feed detail page)

Last checked at: 2026-05-24 09:40:00.477000
Was present on blacklist at: 2026-05-19 09:40, 2026-05-20 09:40, 2026-05-21 09:40, 2026-05-22 09:40, 2026-05-24 09:40
Spamhaus XBL CBL
51.159.202.57 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-05-23 19:48:30.408000
Was present on blacklist at: 2026-05-23 19:48

Threat categories

TLRoleCategoryDetails
40 src login protocol: ssh, telnet
port: 22, 23
34 src scan port: 22, 23, 80, 443, 2222, 2375
30 src

Warden events (39203)
2026-05-17
IntrusionUserCompromise (node.cfb4f7): 21976
AttemptLogin (node.ce2b59): 1
ReconScanning (node.ce2b59): 12
ReconScanning (node.4dc198): 1
2026-05-16
ReconScanning (node.ce2b59): 14
IntrusionUserCompromise (node.cfb4f7): 17197
AttemptLogin (node.ce2b59): 2
DShield reports (IP summary, reports)
2026-05-16
Number of reports: 82
Distinct targets: 15
2026-05-17
Number of reports: 82
Distinct targets: 15
Origin AS
AS12876 - AS12876
BGP Prefix
51.158.0.0/15
geo
France, Paris
🕑 Europe/Paris
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
51.158.0.0 - 51.159.255.255
last_activity
2026-05-17 08:57:18
last_warden_event
2026-05-17 08:57:18
rep
0.42217987120240286
reserved_range
0
Shodan's InternetDB
Open ports: 22, 111, 2222, 9000, 12000
Tags:
CPEs: cpe:/o:canonical:ubuntu_linux, cpe:/a:openbsd:openssh:8.9p1, cpe:/a:openbsd:openssh:9.6p1
ts_added
2026-05-16 19:48:26.350000
ts_last_update
2026-05-24 09:40:35.033000

Warden event timeline

DShield event timeline

Presence on blacklists