IP address


.130103.39.213.131
Shodan(more info)
Passive DNS
Tags: Login attempts
IP blacklists
blocklist.de SSH
103.39.213.131 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-20 05:05:05.377000
Was present on blacklist at: 2025-12-05 23:05, 2025-12-06 05:05, 2025-12-06 11:05, 2025-12-06 17:05, 2025-12-06 23:05, 2025-12-07 05:05, 2025-12-07 11:05, 2025-12-07 17:05, 2025-12-10 23:05, 2025-12-11 05:05, 2025-12-11 11:05, 2025-12-11 17:05, 2025-12-11 23:05, 2025-12-12 05:05, 2025-12-12 11:05, 2025-12-12 17:05, 2025-12-14 11:05, 2025-12-14 17:05, 2025-12-14 23:05, 2025-12-15 05:05, 2025-12-15 11:05, 2025-12-15 17:05, 2025-12-15 23:05, 2025-12-16 05:05, 2025-12-16 17:05, 2025-12-16 23:05, 2025-12-17 05:05, 2025-12-17 11:05, 2025-12-17 17:05, 2025-12-17 23:05, 2025-12-18 05:05, 2025-12-18 11:05, 2025-12-18 17:05, 2025-12-18 23:05, 2025-12-19 05:05, 2025-12-19 11:05, 2025-12-19 17:05, 2025-12-19 23:05, 2025-12-20 05:05
Spamhaus SBL CSS
103.39.213.131 was recently listed on the Spamhaus SBL CSS blacklist, but currently it is not.

Description: The Spamhaus CSS is part of the SBL. CSS listings will have return code 127.0.0.3 to differentiate from regular SBL listings, which have return code 127.0.0.2.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-19 23:05:41.513000
Was present on blacklist at: 2025-12-05 23:05
Spamhaus XBL CBL
103.39.213.131 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-19 23:05:41.513000
Was present on blacklist at: 2025-12-05 23:05, 2025-12-19 23:05
Blocklist.net.ua
103.39.213.131 is listed on the Blocklist.net.ua blacklist.

Description: BlockList contains IP addresses that perform attacks,<br>send spam or brute force passwords to the blocking list.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-19 15:15:01.374000
Was present on blacklist at: 2025-12-06 11:15, 2025-12-06 15:15, 2025-12-06 19:15, 2025-12-06 23:15, 2025-12-07 03:15, 2025-12-07 07:15, 2025-12-07 19:15, 2025-12-07 23:15, 2025-12-08 03:15, 2025-12-08 07:15, 2025-12-08 11:15, 2025-12-08 15:15, 2025-12-09 11:15, 2025-12-09 15:15, 2025-12-09 19:15, 2025-12-09 23:15, 2025-12-10 03:15, 2025-12-10 07:15, 2025-12-10 11:15, 2025-12-10 15:15, 2025-12-10 19:15, 2025-12-10 23:15, 2025-12-11 03:15, 2025-12-11 07:15, 2025-12-11 11:15, 2025-12-11 15:15, 2025-12-11 19:15, 2025-12-11 23:15, 2025-12-12 03:15, 2025-12-12 07:15, 2025-12-12 11:15, 2025-12-12 15:15, 2025-12-12 19:15, 2025-12-12 23:15, 2025-12-13 03:15, 2025-12-13 07:15, 2025-12-13 11:15, 2025-12-13 15:15, 2025-12-13 19:15, 2025-12-13 23:15, 2025-12-14 03:15, 2025-12-14 07:15, 2025-12-14 11:15, 2025-12-14 15:15, 2025-12-14 19:15, 2025-12-14 23:15, 2025-12-15 03:15, 2025-12-15 07:15, 2025-12-15 11:15, 2025-12-15 15:15, 2025-12-15 19:15, 2025-12-15 23:15, 2025-12-16 03:15, 2025-12-16 07:15, 2025-12-18 19:15, 2025-12-18 23:15, 2025-12-19 03:15, 2025-12-19 07:15, 2025-12-19 11:15, 2025-12-19 15:15
DataPlane SSH login
103.39.213.131 is listed on the DataPlane SSH login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-20 07:10:06.289000
Was present on blacklist at: 2025-12-06 19:10, 2025-12-07 03:10, 2025-12-07 07:10, 2025-12-07 15:10, 2025-12-07 19:10, 2025-12-08 03:10, 2025-12-08 07:10, 2025-12-08 15:10, 2025-12-08 19:10, 2025-12-09 03:10, 2025-12-09 07:10, 2025-12-09 15:10, 2025-12-09 19:10, 2025-12-10 03:10, 2025-12-10 07:10, 2025-12-10 15:10, 2025-12-10 19:10, 2025-12-11 03:10, 2025-12-11 07:10, 2025-12-11 15:10, 2025-12-11 19:10, 2025-12-12 03:10, 2025-12-12 07:10, 2025-12-12 15:10, 2025-12-12 19:10, 2025-12-13 03:10, 2025-12-13 07:10, 2025-12-13 15:10, 2025-12-13 19:10, 2025-12-14 03:10, 2025-12-14 07:10, 2025-12-14 15:10, 2025-12-14 19:10, 2025-12-15 03:10, 2025-12-15 07:10, 2025-12-15 15:10, 2025-12-15 19:10, 2025-12-16 03:10, 2025-12-16 07:10, 2025-12-16 15:10, 2025-12-16 19:10, 2025-12-17 03:10, 2025-12-17 07:10, 2025-12-17 15:10, 2025-12-17 19:10, 2025-12-18 03:10, 2025-12-18 07:10, 2025-12-18 15:10, 2025-12-18 19:10, 2025-12-19 03:10, 2025-12-19 07:10, 2025-12-19 15:10, 2025-12-19 19:10, 2025-12-20 03:10, 2025-12-20 07:10
Turris greylist
103.39.213.131 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-10 22:15:00.161000
Was present on blacklist at: 2025-12-10 22:15
AbuseIPDB
103.39.213.131 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-12-20 05:00:00.692000
Was present on blacklist at: 2025-12-14 05:00, 2025-12-20 05:00
Warden events (12)
2025-12-19
IntrusionUserCompromise (node.40929a): 1
2025-12-16
IntrusionUserCompromise (node.40929a): 1
2025-12-13
IntrusionUserCompromise (node.40929a): 1
2025-12-12
AttemptLogin (node.368407): 3
2025-12-11
IntrusionUserCompromise (node.40929a): 1
2025-12-10
IntrusionUserCompromise (node.40929a): 1
2025-12-09
IntrusionUserCompromise (node.40929a): 1
2025-12-08
IntrusionUserCompromise (node.40929a): 1
2025-12-06
AttemptLogin (node.368407): 1
IntrusionUserCompromise (node.40929a): 1
DShield reports (IP summary, reports)
2025-12-08
Number of reports: 28
Distinct targets: 5
2025-12-09
Number of reports: 17
Distinct targets: 4
2025-12-10
Number of reports: 54
Distinct targets: 10
2025-12-11
Number of reports: 27
Distinct targets: 9
2025-12-12
Number of reports: 27
Distinct targets: 9
2025-12-14
Number of reports: 11
Distinct targets: 4
2025-12-17
Number of reports: 30
Distinct targets: 6
2025-12-18
Number of reports: 30
Distinct targets: 6
Origin AS
AS4816 - CHINANET-IDC-GD
BGP Prefix
103.39.208.0/20
geo
China
🕑 Asia/Shanghai
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
103.39.212.0 - 103.39.215.255
last_activity
2025-12-19 09:10:57.304000
last_warden_event
2025-12-19 09:10:57.304000
rep
0.12976190476190477
reserved_range
0
Shodan's InternetDB
Open ports: 443, 7415, 10134
Tags:
CPEs: cpe:/a:f5:nginx
ts_added
2025-12-05 23:05:37.670000
ts_last_update
2025-12-20 07:13:03.853000

Warden event timeline

DShield event timeline

Presence on blacklists