IP address


.75964.89.163.167
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
CI Army
64.89.163.167 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2026-01-31 03:50:00.985000
Was present on blacklist at: 2026-01-22 03:50, 2026-01-23 03:50, 2026-01-24 03:50, 2026-01-25 03:50, 2026-01-26 03:50, 2026-01-27 03:50, 2026-01-28 03:50, 2026-01-29 03:50, 2026-01-30 03:50, 2026-01-31 03:50
AbuseIPDB
64.89.163.167 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-02-23 05:00:00.654000
Was present on blacklist at: 2026-01-23 05:00, 2026-01-25 05:00, 2026-01-26 05:00, 2026-01-28 05:00, 2026-02-01 05:00, 2026-02-05 05:00, 2026-02-13 05:00, 2026-02-15 05:00, 2026-02-18 05:00, 2026-02-19 05:00, 2026-02-21 05:00, 2026-02-23 05:00
DShield Block
64.89.163.167 was recently listed on the DShield Block blacklist, but currently it is not.

Description: Recommended Block List by DShield.org. It summarizes the top 20 attacking<br>class C (/24) subnets over the last three days.
Type of feed: secondary (feed detail page)

Last checked at: 2026-02-22 04:50:00
Was present on blacklist at: 2026-01-23 04:50
Spamhaus SBL
64.89.163.167 is listed on the Spamhaus SBL blacklist.

Description: The Spamhaus Block List ("SBL") Advisory is a database of IP addresses from which Spamhaus does not recommend the acceptance of electronic mail.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-02-18 19:24:25.287000
Was present on blacklist at: 2026-01-28 19:24, 2026-02-04 19:24, 2026-02-11 19:24, 2026-02-18 19:24
Spamhaus DROP
64.89.163.167 is listed on the Spamhaus DROP blacklist.

Description: Spamhaus DROP (Don't Route Or Peer) list. Netblocks controlled by spammers or cyber criminals. The DROP lists are a tiny subset of the SBL, designed for use by firewalls and routing equipment to filter out the malicious traffic from these netblocks.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-02-18 19:24:25.287000
Was present on blacklist at: 2026-01-28 19:24, 2026-02-04 19:24, 2026-02-11 19:24, 2026-02-18 19:24

Threat categories

TLRoleCategoryDetails
49 src scan
25 src login protocol: mysql
port: 3306
25 src exploit protocol: mysql
25 src

Warden events (191)
2026-02-23
ReconScanning (node.4dc198): 4
ReconScanning (node.368407): 2
IntrusionUserCompromise+AttemptExploit (node.709b07): 1
2026-02-22
ReconScanning (node.368407): 5
ReconScanning (node.4dc198): 3
2026-02-21
ReconScanning (node.4dc198): 3
ReconScanning (node.368407): 6
2026-02-20
ReconScanning (node.4dc198): 1
ReconScanning (node.368407): 3
2026-02-19
IntrusionUserCompromise+AttemptExploit (node.5bdc26): 1
ReconScanning (node.4dc198): 2
ReconScanning (node.368407): 1
2026-02-18
ReconScanning (node.368407): 5
ReconScanning (node.4dc198): 2
2026-02-17
ReconScanning (node.368407): 3
ReconScanning (node.4dc198): 2
2026-02-16
ReconScanning (node.368407): 4
AnomalyTraffic (node.ffe95c): 1
ReconScanning (node.4dc198): 2
IntrusionUserCompromise+AttemptExploit (node.0b69da): 1
2026-02-15
ReconScanning (node.368407): 6
AnomalyTraffic (node.ffe95c): 1
ReconScanning (node.4dc198): 1
2026-02-14
ReconScanning (node.368407): 6
ReconScanning (node.4dc198): 5
2026-02-13
ReconScanning (node.4dc198): 4
ReconScanning (node.368407): 4
IntrusionUserCompromise+AttemptExploit (node.2373ce): 1
2026-02-12
ReconScanning (node.4dc198): 4
2026-02-07
AnomalyTraffic (node.ffe95c): 1
ReconScanning (node.4dc198): 1
2026-02-06
ReconScanning (node.4dc198): 3
ReconScanning (node.368407): 1
AnomalyTraffic (node.ffe95c): 1
2026-02-05
ReconScanning (node.368407): 3
ReconScanning (node.4dc198): 3
2026-02-04
ReconScanning (node.4dc198): 3
ReconScanning (node.368407): 3
2026-02-03
ReconScanning (node.368407): 5
ReconScanning (node.4dc198): 4
2026-02-02
AnomalyTraffic (node.ffe95c): 1
ReconScanning (node.4dc198): 1
2026-02-01
ReconScanning (node.4dc198): 2
ReconScanning (node.368407): 5
AnomalyTraffic (node.ffe95c): 2
2026-01-31
ReconScanning (node.368407): 7
ReconScanning (node.4dc198): 5
2026-01-30
ReconScanning (node.368407): 1
2026-01-29
ReconScanning (node.368407): 1
2026-01-28
ReconScanning (node.368407): 3
AnomalyTraffic (node.ffe95c): 1
ReconScanning (node.4dc198): 3
2026-01-27
ReconScanning (node.368407): 7
AnomalyTraffic (node.ffe95c): 3
ReconScanning (node.4dc198): 4
2026-01-26
ReconScanning (node.4dc198): 4
ReconScanning (node.368407): 2
AnomalyTraffic (node.ffe95c): 2
2026-01-25
AnomalyTraffic (node.ffe95c): 3
ReconScanning (node.4dc198): 3
ReconScanning (node.368407): 1
2026-01-24
ReconScanning (node.368407): 4
ReconScanning (node.4dc198): 2
2026-01-23
ReconScanning (node.4dc198): 1
ReconScanning (node.368407): 1
2026-01-22
ReconScanning (node.368407): 4
ReconScanning (node.4dc198): 2
IntrusionUserCompromise+AttemptExploit (node.c26a5f): 1
AnomalyTraffic (node.ffe95c): 1
2026-01-21
ReconScanning (node.4dc198): 1
ReconScanning (node.368407): 1
DShield reports (IP summary, reports)
2026-01-21
Number of reports: 31
Distinct targets: 31
2026-01-22
Number of reports: 30
Distinct targets: 29
2026-01-23
Number of reports: 84
Distinct targets: 58
2026-01-24
Number of reports: 84
Distinct targets: 58
2026-01-25
Number of reports: 103
Distinct targets: 58
2026-01-26
Number of reports: 103
Distinct targets: 58
Origin AS
AS401626 - NETIFACE-TORONTO
BGP Prefix
64.89.163.0/24
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
64.89.160.0 - 64.89.163.255
last_activity
2026-02-23 05:59:40.159000
last_warden_event
2026-02-23 05:59:40.159000
rep
0.7591413225446428
reserved_range
0
ts_added
2026-01-21 19:24:19.067000
ts_last_update
2026-02-23 05:59:45.098000

Warden event timeline

DShield event timeline

Presence on blacklists