IP address


.28482.67.48.130vil69-1_migr-82-67-48-130.fbx.proxad.net
Shodan(more info)
Passive DNS
Tags: IP in hostname Login attempts Scanner
IP blacklists
Blocklist.net.ua
82.67.48.130 is listed on the Blocklist.net.ua blacklist.

Description: BlockList contains IP addresses that perform attacks,<br>send spam or brute force passwords to the blocking list.
Type of feed: primary (feed detail page)

Last checked at: 2024-12-13 07:15:01.988000
Was present on blacklist at: 2024-11-06 03:15, 2024-11-06 07:15, 2024-11-06 11:15, 2024-11-06 15:15, 2024-11-06 19:15, 2024-11-06 23:15, 2024-11-09 07:15, 2024-11-09 11:15, 2024-11-09 15:15, 2024-11-09 19:15, 2024-11-09 23:15, 2024-11-10 03:15, 2024-11-16 23:15, 2024-11-17 03:15, 2024-11-17 07:15, 2024-11-17 11:15, 2024-11-17 15:15, 2024-11-17 19:15, 2024-12-12 11:15, 2024-12-12 15:15, 2024-12-12 19:15, 2024-12-12 23:15, 2024-12-13 03:15, 2024-12-13 07:15
CI Army
82.67.48.130 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2024-11-27 03:50:01.116000
Was present on blacklist at: 2024-11-12 03:50, 2024-11-15 03:50, 2024-11-17 03:50, 2024-11-20 03:50, 2024-11-23 03:50, 2024-11-25 03:50, 2024-11-26 03:50, 2024-11-27 03:50
blocklist.de SSH
82.67.48.130 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2024-11-15 23:05:00.230000
Was present on blacklist at: 2024-11-14 05:05, 2024-11-14 11:05, 2024-11-14 17:05, 2024-11-14 23:05, 2024-11-15 05:05, 2024-11-15 11:05, 2024-11-15 17:05, 2024-11-15 23:05
DataPlane SSH conn
82.67.48.130 is listed on the DataPlane SSH conn blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IP addresses that<br>has been seen initiating an unsolicited SSH connection to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2024-12-23 23:10:02.971000
Was present on blacklist at: 2024-11-22 03:10, 2024-11-22 07:10, 2024-11-22 11:10, 2024-11-22 15:10, 2024-11-22 19:10, 2024-11-22 23:10, 2024-11-23 03:10, 2024-11-23 07:10, 2024-11-23 11:10, 2024-11-23 15:10, 2024-11-23 19:10, 2024-11-23 23:10, 2024-11-24 03:10, 2024-11-24 07:10, 2024-11-24 11:10, 2024-11-24 15:10, 2024-11-24 19:10, 2024-11-24 23:10, 2024-11-25 03:10, 2024-11-25 07:10, 2024-11-25 11:10, 2024-11-25 15:10, 2024-11-25 19:10, 2024-11-25 23:10, 2024-11-26 03:10, 2024-11-26 07:10, 2024-11-26 11:10, 2024-11-26 15:10, 2024-11-26 19:10, 2024-11-26 23:10, 2024-11-27 03:10, 2024-11-27 07:10, 2024-11-27 11:10, 2024-11-27 15:10, 2024-11-27 19:10, 2024-11-27 23:10, 2024-11-28 03:10, 2024-11-28 07:10, 2024-11-28 11:10, 2024-11-28 15:10, 2024-11-28 19:10, 2024-11-28 23:10, 2024-11-29 03:10, 2024-11-29 07:10, 2024-11-29 11:10, 2024-11-29 15:10, 2024-11-29 19:10, 2024-11-29 23:10, 2024-11-30 03:10, 2024-11-30 07:10, 2024-11-30 11:10, 2024-11-30 15:10, 2024-11-30 19:10, 2024-11-30 23:10, 2024-12-01 03:10, 2024-12-01 07:10, 2024-12-01 11:10, 2024-12-01 15:10, 2024-12-01 19:10, 2024-12-01 23:10, 2024-12-02 03:10, 2024-12-02 07:10, 2024-12-02 11:10, 2024-12-02 15:10, 2024-12-02 19:10, 2024-12-02 23:10, 2024-12-03 03:10, 2024-12-03 07:10, 2024-12-03 11:10, 2024-12-03 15:10, 2024-12-03 19:10, 2024-12-04 03:10, 2024-12-04 07:10, 2024-12-04 11:10, 2024-12-04 15:10, 2024-12-04 19:10, 2024-12-04 23:10, 2024-12-05 03:10, 2024-12-05 07:10, 2024-12-05 11:10, 2024-12-05 15:10, 2024-12-05 19:10, 2024-12-05 23:10, 2024-12-06 03:10, 2024-12-06 07:10, 2024-12-06 11:10, 2024-12-06 15:10, 2024-12-06 19:10, 2024-12-06 23:10, 2024-12-07 03:10, 2024-12-07 07:10, 2024-12-07 11:10, 2024-12-07 15:10, 2024-12-07 19:10, 2024-12-07 23:10, 2024-12-08 03:10, 2024-12-08 07:10, 2024-12-08 11:10, 2024-12-08 15:10, 2024-12-08 19:10, 2024-12-08 23:10, 2024-12-09 03:10, 2024-12-09 07:10, 2024-12-09 11:10, 2024-12-09 15:10, 2024-12-09 19:10, 2024-12-09 23:10, 2024-12-10 03:10, 2024-12-10 07:10, 2024-12-10 11:10, 2024-12-10 15:10, 2024-12-10 19:10, 2024-12-23 19:10, 2024-12-23 23:10
Warden events (1150)
2024-12-22
IntrusionUserCompromise (node.cfb4f7): 2
2024-12-19
AttemptLogin (node.4dc198): 17
2024-12-17
ReconScanning (node.ce2b59): 8
2024-12-16
ReconScanning (node.ce2b59): 3
2024-12-15
ReconScanning (node.ce2b59): 3
AttemptLogin (node.4dc198): 2
2024-12-14
ReconScanning (node.ce2b59): 8
2024-12-13
ReconScanning (node.ce2b59): 12
AttemptLogin (node.4dc198): 2
2024-12-12
ReconScanning (node.ce2b59): 12
2024-12-11
ReconScanning (node.ce2b59): 14
2024-12-10
ReconScanning (node.ce2b59): 12
2024-12-09
AttemptLogin (node.4dc198): 7
ReconScanning (node.ce2b59): 15
2024-12-08
AttemptLogin (node.4dc198): 165
ReconScanning (node.ce2b59): 13
2024-12-07
ReconScanning (node.ce2b59): 14
AttemptLogin (node.4dc198): 115
2024-12-06
ReconScanning (node.ce2b59): 12
2024-12-05
ReconScanning (node.ce2b59): 12
2024-12-04
ReconScanning (node.ce2b59): 19
2024-12-03
ReconScanning (node.ce2b59): 14
2024-12-02
ReconScanning (node.ce2b59): 12
2024-12-01
AttemptLogin (node.4dc198): 2
ReconScanning (node.ce2b59): 12
2024-11-30
ReconScanning (node.ce2b59): 4
2024-11-29
ReconScanning (node.ce2b59): 2
2024-11-28
ReconScanning (node.ce2b59): 7
2024-11-26
ReconScanning (node.ce2b59): 10
2024-11-25
ReconScanning (node.ce2b59): 4
AttemptLogin (node.4dc198): 2
2024-11-24
AttemptLogin (node.4dc198): 43
ReconScanning (node.ce2b59): 11
2024-11-23
ReconScanning (node.ce2b59): 14
AttemptLogin (node.4dc198): 14
2024-11-22
ReconScanning (node.ce2b59): 11
2024-11-21
ReconScanning (node.ce2b59): 19
2024-11-20
ReconScanning (node.ce2b59): 19
2024-11-19
ReconScanning (node.ce2b59): 18
AttemptLogin (node.4dc198): 70
2024-11-18
ReconScanning (node.ce2b59): 22
AttemptLogin (node.4dc198): 9
2024-11-17
ReconScanning (node.ce2b59): 21
AttemptLogin (node.4dc198): 35
2024-11-16
ReconScanning (node.ce2b59): 16
2024-11-15
AttemptLogin (node.4dc198): 173
ReconScanning (node.ce2b59): 16
2024-11-14
AttemptLogin (node.4dc198): 15
ReconScanning (node.ce2b59): 2
2024-11-13
ReconScanning (node.ce2b59): 15
2024-11-12
ReconScanning (node.ce2b59): 22
AttemptLogin (node.4dc198): 9
2024-11-11
AttemptLogin (node.4dc198): 37
2024-11-08
AttemptLogin (node.4dc198): 3
DShield reports (IP summary, reports)
2024-12-04
Number of reports: 1799
Distinct targets: 3
2024-12-22
Number of reports: 46
Distinct targets: 27
Origin AS
AS12322 - PROXAD
BGP Prefix
82.64.0.0/14
geo
France, Paris
🕑 Europe/Paris
hostname
vil69-1_migr-82-67-48-130.fbx.proxad.net
hostname_class
['ip_in_hostname']
Address block ('inetnum' or 'NetRange' in whois database)
82.64.0.0 - 82.67.255.255
last_activity
2024-12-22 18:01:23
last_warden_event
2024-12-22 18:01:23
rep
0.2835306076776413
reserved_range
0
Shodan's InternetDB
Open ports: 10250
Tags: devops
CPEs:
ts_added
2024-11-06 03:21:32.024000
ts_last_update
2024-12-23 23:12:21.569000

Warden event timeline

DShield event timeline

Presence on blacklists