IP address


.745104.168.92.214104-168-92-214-host.colocrossing.com
Shodan(more info)
Passive DNS
Tags: IP in hostname Login attempts Scanner
IP blacklists
CI Army
104.168.92.214 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2026-02-17 03:50:00.835000
Was present on blacklist at: 2026-01-19 03:50, 2026-01-20 03:50, 2026-01-21 03:50, 2026-01-22 03:50, 2026-01-23 03:50, 2026-01-24 03:50, 2026-01-25 03:50, 2026-01-26 03:50, 2026-01-27 03:50, 2026-01-28 03:50, 2026-01-29 03:50, 2026-01-30 03:50, 2026-01-31 03:50, 2026-02-01 03:50, 2026-02-02 03:50, 2026-02-03 03:50, 2026-02-04 03:50, 2026-02-05 03:50, 2026-02-06 03:50, 2026-02-07 03:50, 2026-02-08 03:50, 2026-02-09 03:50, 2026-02-11 03:50, 2026-02-12 03:50, 2026-02-13 03:50, 2026-02-14 03:50, 2026-02-15 03:50, 2026-02-16 03:50, 2026-02-17 03:50
blocklist.de SSH
104.168.92.214 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-03 10:05:05.259000
Was present on blacklist at: 2026-01-22 23:05, 2026-01-23 05:05, 2026-01-23 11:05, 2026-01-23 17:05, 2026-01-23 23:05, 2026-01-24 05:05, 2026-01-24 11:05, 2026-01-24 17:05, 2026-01-29 23:05, 2026-01-30 05:05, 2026-01-30 11:05, 2026-02-04 17:05, 2026-02-04 23:05, 2026-02-05 05:05, 2026-02-05 11:05, 2026-02-05 17:05, 2026-02-05 23:05, 2026-02-06 05:05, 2026-02-06 11:05, 2026-02-06 17:05, 2026-02-06 23:05, 2026-03-01 11:05, 2026-03-01 17:05, 2026-03-01 23:05, 2026-03-02 05:05, 2026-03-02 11:05, 2026-03-02 17:05, 2026-03-02 23:05, 2026-03-03 05:05, 2026-03-03 17:05, 2026-03-03 23:05, 2026-03-04 05:05, 2026-03-04 11:05, 2026-03-04 17:05, 2026-03-04 23:05, 2026-03-05 05:05, 2026-03-05 11:05, 2026-03-12 23:05, 2026-03-13 05:05, 2026-03-13 11:05, 2026-03-13 17:05, 2026-03-13 23:05, 2026-03-14 05:05, 2026-03-14 11:05, 2026-03-22 17:05, 2026-03-22 23:05, 2026-03-23 05:05, 2026-03-23 11:05, 2026-03-23 17:05, 2026-03-23 23:05, 2026-03-24 05:05, 2026-03-24 11:05, 2026-03-24 23:05, 2026-03-25 05:05, 2026-03-25 11:05, 2026-03-25 23:05, 2026-03-26 05:05, 2026-03-26 11:05, 2026-03-26 17:05, 2026-03-26 23:05, 2026-04-01 04:05, 2026-04-01 10:05, 2026-04-01 16:05, 2026-04-01 22:05, 2026-04-02 04:05, 2026-04-02 10:05, 2026-04-02 16:05, 2026-04-02 22:05, 2026-04-03 04:05, 2026-04-03 10:05
AbuseIPDB
104.168.92.214 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-04-02 04:00:00.574000
Was present on blacklist at: 2026-01-25 05:00, 2026-01-26 05:00, 2026-01-28 05:00, 2026-01-29 05:00, 2026-01-30 05:00, 2026-01-31 05:00, 2026-02-01 05:00, 2026-02-02 05:00, 2026-02-03 05:00, 2026-02-04 05:00, 2026-02-05 05:00, 2026-02-06 05:00, 2026-02-09 05:00, 2026-02-10 05:00, 2026-02-11 05:00, 2026-02-12 05:00, 2026-02-13 05:00, 2026-02-15 05:00, 2026-03-06 05:00, 2026-03-16 05:00, 2026-03-20 05:00, 2026-03-21 05:00, 2026-03-27 05:00, 2026-04-02 04:00
DataPlane SSH login
104.168.92.214 is listed on the DataPlane SSH login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-10 07:10:02.486000
Was present on blacklist at: 2026-01-29 03:10, 2026-01-29 07:10, 2026-01-29 19:10, 2026-01-30 03:10, 2026-01-30 07:10, 2026-01-30 15:10, 2026-01-30 19:10, 2026-01-31 03:10, 2026-01-31 07:10, 2026-01-31 15:10, 2026-01-31 19:10, 2026-02-01 03:10, 2026-02-01 07:10, 2026-02-01 15:10, 2026-02-01 19:10, 2026-02-02 03:10, 2026-02-02 07:10, 2026-02-02 15:10, 2026-02-02 19:10, 2026-02-03 03:10, 2026-02-03 07:10, 2026-02-03 15:10, 2026-02-03 19:10, 2026-02-04 03:10, 2026-02-04 07:10, 2026-02-04 15:10, 2026-02-05 03:10, 2026-02-05 15:10, 2026-02-05 19:10, 2026-02-06 03:10, 2026-02-06 07:10, 2026-02-06 15:10, 2026-02-07 03:10, 2026-02-07 07:10, 2026-02-07 15:10, 2026-02-07 19:10, 2026-02-08 03:10, 2026-02-08 07:10, 2026-02-08 15:10, 2026-02-08 19:10, 2026-02-09 03:10, 2026-02-09 07:10, 2026-02-09 15:10, 2026-02-09 19:10, 2026-02-10 03:10, 2026-02-10 07:10
DataPlane SSH conn
104.168.92.214 is listed on the DataPlane SSH conn blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IP addresses that<br>has been seen initiating an unsolicited SSH connection to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-04 07:10:01.894000
Was present on blacklist at: 2026-01-29 03:10, 2026-01-29 07:10, 2026-01-29 15:10, 2026-01-29 19:10, 2026-01-30 03:10, 2026-01-30 07:10, 2026-01-30 15:10, 2026-01-30 19:10, 2026-01-31 03:10, 2026-01-31 07:10, 2026-01-31 15:10, 2026-01-31 19:10, 2026-02-01 03:10, 2026-02-01 07:10, 2026-02-01 15:10, 2026-02-01 19:10, 2026-02-02 03:10, 2026-02-02 07:10, 2026-02-02 15:10, 2026-02-02 19:10, 2026-02-03 03:10, 2026-02-03 07:10, 2026-02-03 15:10, 2026-02-03 19:10, 2026-02-04 03:10, 2026-02-04 07:10, 2026-02-04 15:10, 2026-02-04 19:10, 2026-02-05 03:10, 2026-02-05 07:10, 2026-02-05 11:10, 2026-02-05 15:10, 2026-02-05 19:10, 2026-02-05 23:10, 2026-02-06 03:10, 2026-02-06 07:10, 2026-02-06 11:10, 2026-02-06 15:10, 2026-02-06 19:10, 2026-02-06 23:10, 2026-02-07 03:10, 2026-02-07 07:10, 2026-02-07 11:10, 2026-02-07 15:10, 2026-02-07 19:10, 2026-02-07 23:10, 2026-02-08 03:10, 2026-02-08 07:10, 2026-02-08 11:10, 2026-02-08 15:10, 2026-02-08 19:10, 2026-02-08 23:10, 2026-02-09 03:10, 2026-02-09 07:10, 2026-02-09 11:10, 2026-02-09 15:10, 2026-02-09 19:10, 2026-02-09 23:10, 2026-02-10 03:10, 2026-02-10 07:10, 2026-02-10 11:10, 2026-02-10 15:10, 2026-02-10 19:10, 2026-02-10 23:10, 2026-02-11 03:10, 2026-02-11 07:10, 2026-02-11 11:10, 2026-02-11 15:10, 2026-02-11 19:10, 2026-02-11 23:10, 2026-02-12 03:10, 2026-02-12 07:10, 2026-02-12 11:10, 2026-02-12 15:10, 2026-02-12 19:10, 2026-02-12 23:10, 2026-02-13 03:10, 2026-02-13 07:10, 2026-02-13 11:10, 2026-02-13 15:10, 2026-02-13 19:10, 2026-02-13 23:10, 2026-02-14 03:10, 2026-02-14 07:10, 2026-02-14 11:10, 2026-02-14 15:10, 2026-02-14 19:10, 2026-02-14 23:10, 2026-02-15 03:10, 2026-02-15 07:10, 2026-02-15 15:10, 2026-02-15 19:10, 2026-02-16 03:10, 2026-02-16 07:10, 2026-02-16 15:10, 2026-02-16 19:10, 2026-02-16 23:10, 2026-02-17 03:10, 2026-02-17 07:10, 2026-02-17 11:10, 2026-02-17 15:10, 2026-02-17 19:10, 2026-02-17 23:10, 2026-02-18 03:10, 2026-02-18 07:10, 2026-02-18 11:10, 2026-02-18 15:10, 2026-02-18 19:10, 2026-02-18 23:10, 2026-02-19 03:10, 2026-02-19 07:10, 2026-02-19 11:10, 2026-02-19 15:10, 2026-02-19 19:10, 2026-02-20 03:10, 2026-02-20 07:10, 2026-02-20 11:10, 2026-02-20 15:10, 2026-02-20 19:10, 2026-03-01 15:10, 2026-03-01 19:10, 2026-03-02 03:10, 2026-03-02 07:10, 2026-03-02 11:10, 2026-03-02 15:10, 2026-03-02 19:10, 2026-03-02 23:10, 2026-03-03 03:10, 2026-03-03 07:10, 2026-03-03 11:10, 2026-03-03 15:10, 2026-03-03 19:10, 2026-03-04 03:10, 2026-03-04 07:10
Blocklist.net.ua
104.168.92.214 is listed on the Blocklist.net.ua blacklist.

Description: BlockList contains IP addresses that perform attacks,<br>send spam or brute force passwords to the blocking list.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-04 11:15:01.576000
Was present on blacklist at: 2026-01-29 03:15, 2026-01-29 07:15, 2026-01-29 11:15, 2026-01-29 15:15, 2026-01-29 19:15, 2026-01-29 23:15, 2026-01-30 07:15, 2026-01-30 11:15, 2026-01-30 15:15, 2026-01-30 19:15, 2026-01-30 23:15, 2026-01-31 03:15, 2026-01-31 15:15, 2026-01-31 19:15, 2026-01-31 23:15, 2026-02-01 03:15, 2026-02-01 07:15, 2026-02-01 11:15, 2026-02-01 15:15, 2026-02-01 19:15, 2026-02-01 23:15, 2026-02-02 03:15, 2026-02-02 07:15, 2026-02-02 11:15, 2026-02-02 15:15, 2026-02-02 19:15, 2026-02-02 23:15, 2026-02-03 03:15, 2026-02-03 07:15, 2026-02-03 11:15, 2026-02-03 15:15, 2026-02-03 19:15, 2026-02-03 23:15, 2026-02-04 03:15, 2026-02-04 07:15, 2026-02-04 11:15, 2026-02-04 15:15, 2026-02-04 19:15, 2026-02-04 23:15, 2026-02-05 03:15, 2026-02-05 07:15, 2026-02-05 11:15, 2026-02-05 15:15, 2026-02-05 19:15, 2026-02-05 23:15, 2026-02-06 03:15, 2026-02-06 07:15, 2026-02-06 11:15, 2026-02-06 15:15, 2026-02-06 19:15, 2026-02-06 23:15, 2026-02-07 03:15, 2026-02-07 07:15, 2026-02-07 11:15, 2026-02-09 11:15, 2026-02-09 15:15, 2026-02-09 19:15, 2026-02-09 23:15, 2026-02-10 03:15, 2026-02-10 07:15, 2026-02-10 15:15, 2026-02-10 19:15, 2026-02-10 23:15, 2026-02-11 03:15, 2026-02-11 07:15, 2026-02-11 11:15, 2026-02-11 15:15, 2026-02-11 19:15, 2026-02-11 23:15, 2026-02-12 03:15, 2026-02-12 07:15, 2026-02-12 11:15, 2026-02-12 15:15, 2026-02-12 19:15, 2026-02-12 23:15, 2026-02-13 03:15, 2026-02-13 07:15, 2026-02-13 11:15, 2026-02-13 15:15, 2026-02-13 19:15, 2026-02-13 23:15, 2026-02-14 03:15, 2026-02-14 07:15, 2026-02-14 11:15, 2026-02-14 15:15, 2026-02-14 19:15, 2026-02-14 23:15, 2026-02-15 03:15, 2026-02-15 07:15, 2026-02-15 11:15, 2026-02-15 15:15, 2026-02-15 19:15, 2026-02-15 23:15, 2026-02-16 03:15, 2026-02-16 07:15, 2026-02-16 11:15, 2026-02-16 15:15, 2026-02-16 19:15, 2026-02-16 23:15, 2026-02-17 03:15, 2026-02-17 07:15, 2026-02-17 11:15, 2026-02-17 15:15, 2026-02-17 19:15, 2026-02-17 23:15, 2026-02-18 03:15, 2026-02-18 07:15, 2026-02-18 11:15, 2026-02-18 15:15, 2026-02-18 19:15, 2026-02-18 23:15, 2026-02-19 03:15, 2026-02-19 07:15, 2026-02-19 11:15, 2026-02-19 15:15, 2026-02-19 19:15, 2026-02-19 23:15, 2026-02-20 03:15, 2026-02-20 07:15, 2026-02-20 11:15, 2026-02-20 15:15, 2026-02-20 19:15, 2026-02-20 23:15, 2026-02-21 03:15, 2026-02-21 07:15, 2026-02-21 11:15, 2026-02-21 15:15, 2026-02-21 19:15, 2026-02-21 23:15, 2026-02-22 03:15, 2026-02-22 07:15, 2026-02-22 11:15, 2026-02-22 15:15, 2026-02-22 19:15, 2026-02-22 23:15, 2026-02-23 03:15, 2026-02-23 07:15, 2026-02-23 11:15, 2026-02-23 15:15, 2026-02-23 19:15, 2026-02-23 23:15, 2026-02-24 03:15, 2026-02-24 07:15, 2026-02-24 11:15, 2026-02-24 15:15, 2026-02-24 19:15, 2026-02-24 23:15, 2026-02-25 03:15, 2026-02-25 07:15, 2026-02-25 11:15, 2026-02-25 15:15, 2026-02-25 19:15, 2026-02-25 23:15, 2026-02-26 03:15, 2026-02-26 07:15, 2026-02-26 11:15, 2026-02-26 15:15, 2026-02-26 19:15, 2026-02-26 23:15, 2026-02-27 03:15, 2026-02-27 07:15, 2026-02-27 11:15, 2026-02-27 15:15, 2026-02-27 19:15, 2026-02-27 23:15, 2026-02-28 03:15, 2026-02-28 07:15, 2026-02-28 11:15, 2026-02-28 15:15, 2026-02-28 19:15, 2026-02-28 23:15, 2026-03-01 03:15, 2026-03-01 07:15, 2026-03-01 11:15, 2026-03-01 15:15, 2026-03-01 19:15, 2026-03-01 23:15, 2026-03-02 03:15, 2026-03-02 07:15, 2026-03-02 11:15, 2026-03-02 15:15, 2026-03-02 19:15, 2026-03-02 23:15, 2026-03-03 03:15, 2026-03-03 07:15, 2026-03-03 11:15, 2026-03-03 15:15, 2026-03-03 19:15, 2026-03-03 23:15, 2026-03-04 03:15, 2026-03-04 07:15, 2026-03-04 11:15
blocklist.de Apache
104.168.92.214 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-06 22:05:05.297000
Was present on blacklist at: 2026-01-30 17:05, 2026-01-30 23:05, 2026-01-31 05:05, 2026-01-31 11:05, 2026-01-31 17:05, 2026-01-31 23:05, 2026-02-01 05:05, 2026-02-01 11:05, 2026-02-01 17:05, 2026-02-12 05:05, 2026-02-12 11:05, 2026-02-12 17:05, 2026-02-12 23:05, 2026-02-13 05:05, 2026-02-13 11:05, 2026-02-13 17:05, 2026-02-13 23:05, 2026-03-09 11:05, 2026-03-09 17:05, 2026-03-09 23:05, 2026-03-10 05:05, 2026-03-10 11:05, 2026-03-10 17:05, 2026-03-10 23:05, 2026-03-11 05:05, 2026-03-11 11:05, 2026-03-11 17:05, 2026-03-11 23:05, 2026-03-12 05:05, 2026-03-12 11:05, 2026-03-12 17:05, 2026-03-14 23:05, 2026-03-15 05:05, 2026-03-15 11:05, 2026-03-15 17:05, 2026-03-15 23:05, 2026-03-16 05:05, 2026-03-16 11:05, 2026-03-16 17:05, 2026-04-04 22:05, 2026-04-05 04:05, 2026-04-05 10:05, 2026-04-05 16:05, 2026-04-05 22:05, 2026-04-06 04:05, 2026-04-06 10:05, 2026-04-06 16:05, 2026-04-06 22:05
blocklist.de web-login
104.168.92.214 is listed on the blocklist.de web-login blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-06 22:05:05.087000
Was present on blacklist at: 2026-01-30 17:05, 2026-01-30 23:05, 2026-01-31 05:05, 2026-01-31 11:05, 2026-01-31 17:05, 2026-01-31 23:05, 2026-02-01 05:05, 2026-02-01 11:05, 2026-02-01 17:05, 2026-02-12 05:05, 2026-02-12 11:05, 2026-02-12 17:05, 2026-02-12 23:05, 2026-02-13 05:05, 2026-02-13 11:05, 2026-02-13 17:05, 2026-02-13 23:05, 2026-03-09 11:05, 2026-03-09 17:05, 2026-03-09 23:05, 2026-03-10 05:05, 2026-03-10 11:05, 2026-03-10 17:05, 2026-03-10 23:05, 2026-03-11 05:05, 2026-03-11 11:05, 2026-03-11 17:05, 2026-03-11 23:05, 2026-03-12 05:05, 2026-03-12 11:05, 2026-03-12 17:05, 2026-03-14 23:05, 2026-03-15 05:05, 2026-03-15 11:05, 2026-03-15 17:05, 2026-03-15 23:05, 2026-03-16 05:05, 2026-03-16 11:05, 2026-03-16 17:05, 2026-04-04 22:05, 2026-04-05 04:05, 2026-04-05 10:05, 2026-04-05 16:05, 2026-04-05 22:05, 2026-04-06 04:05, 2026-04-06 10:05, 2026-04-06 16:05, 2026-04-06 22:05

Threat categories

TLRoleCategoryDetails
67 src login protocol: ssh
port: 22
50 src scan port: many
36 src
25 src botnet_drone

Warden events (894)
2026-04-07
AttemptLogin (node.4dc198): 3
ReconScanning (node.ce2b59): 7
2026-04-06
ReconScanning (node.ce2b59): 24
AttemptLogin (node.4dc198): 7
AttemptLogin (node.368407): 5
2026-04-05
ReconScanning (node.ce2b59): 10
AttemptLogin (node.4dc198): 4
AttemptLogin (node.368407): 5
2026-04-04
ReconScanning (node.ce2b59): 4
AttemptLogin (node.4dc198): 9
AttemptLogin (node.368407): 2
2026-04-03
ReconScanning (node.ce2b59): 9
AttemptLogin (node.4dc198): 1
AttemptLogin (node.368407): 1
ReconScanning (node.9c1411): 9
2026-04-02
ReconScanning (node.ce2b59): 20
AttemptLogin (node.4dc198): 1
IntrusionUserCompromise (node.40929a): 1
2026-04-01
AttemptLogin (node.368407): 12
ReconScanning (node.ce2b59): 30
Malware (node.e1f86c): 1
IntrusionUserCompromise (node.e1f86c): 1
AttemptLogin (node.e1f86c): 1
2026-03-29
ReconScanning (node.9c1411): 15
2026-03-28
ReconScanning (node.9c1411): 55
ReconScanning (node.ce2b59): 6
AttemptLogin (node.368407): 1
AttemptLogin (node.4dc198): 1
2026-03-27
ReconScanning (node.ce2b59): 12
AttemptLogin (node.4dc198): 8
AttemptLogin (node.368407): 10
ReconScanning (node.9c1411): 20
IntrusionUserCompromise (node.40929a): 1
2026-03-26
AttemptLogin (node.4dc198): 8
ReconScanning (node.ce2b59): 11
AttemptLogin (node.368407): 13
ReconScanning (node.9c1411): 3
2026-03-25
AttemptLogin (node.4dc198): 4
AttemptLogin (node.368407): 1
ReconScanning (node.9c1411): 3
ReconScanning (node.ce2b59): 7
2026-03-24
AttemptLogin (node.368407): 6
AttemptLogin (node.4dc198): 4
ReconScanning (node.9c1411): 1
2026-03-23
ReconScanning (node.9c1411): 2
AttemptLogin (node.368407): 2
AttemptLogin (node.4dc198): 2
2026-03-22
ReconScanning (node.9c1411): 7
AttemptLogin (node.368407): 2
2026-03-21
AttemptLogin (node.368407): 6
IntrusionUserCompromise (node.40929a): 1
2026-03-20
AttemptLogin (node.368407): 7
2026-03-19
ReconScanning (node.9c1411): 1
AttemptLogin (node.368407): 7
2026-03-18
ReconScanning (node.9c1411): 8
2026-03-17
ReconScanning (node.9c1411): 3
AttemptLogin (node.368407): 3
2026-03-16
AttemptLogin (node.368407): 1
ReconScanning (node.9c1411): 6
2026-03-15
ReconScanning (node.9c1411): 19
AttemptLogin (node.368407): 6
2026-03-14
ReconScanning (node.9c1411): 56
AttemptLogin (node.368407): 1
2026-03-13
AttemptLogin (node.368407): 8
ReconScanning (node.9c1411): 7
2026-03-12
AttemptLogin (node.368407): 8
ReconScanning (node.9c1411): 7
2026-03-11
ReconScanning (node.9c1411): 7
2026-03-10
AttemptLogin (node.368407): 4
ReconScanning (node.9c1411): 3
2026-03-09
AttemptLogin (node.368407): 8
ReconScanning (node.9c1411): 1
2026-03-08
AttemptLogin (node.368407): 14
ReconScanning (node.9c1411): 7
2026-03-07
ReconScanning (node.9c1411): 3
AttemptLogin (node.368407): 5
2026-03-06
ReconScanning (node.9c1411): 7
AttemptLogin (node.368407): 9
2026-03-05
ReconScanning (node.9c1411): 1
AttemptLogin (node.368407): 4
2026-03-04
ReconScanning (node.9c1411): 1
2026-03-03
ReconScanning (node.9c1411): 3
2026-03-02
AttemptLogin (node.368407): 17
ReconScanning (node.9c1411): 4
IntrusionUserCompromise (node.03e7a9): 1
Malware (node.03e7a9): 1
AttemptLogin (node.03e7a9): 1
2026-03-01
ReconScanning (node.9c1411): 14
AttemptLogin (node.368407): 9
2026-02-14
AttemptLogin (node.368407): 1
ReconScanning (node.9c1411): 5
2026-02-13
ReconScanning (node.9c1411): 10
AttemptLogin (node.368407): 10
2026-02-12
ReconScanning (node.9c1411): 6
AttemptLogin (node.368407): 2
2026-02-11
ReconScanning (node.9c1411): 17
AttemptLogin (node.368407): 8
2026-02-10
ReconScanning (node.9c1411): 8
AttemptLogin (node.368407): 1
2026-02-09
ReconScanning (node.9c1411): 8
AttemptLogin (node.368407): 4
2026-02-08
AttemptLogin (node.368407): 7
IntrusionUserCompromise (node.40929a): 1
2026-02-07
AttemptLogin (node.368407): 2
2026-02-06
AttemptLogin (node.368407): 2
ReconScanning (node.9c1411): 2
IntrusionUserCompromise (node.40929a): 1
2026-02-05
ReconScanning (node.9c1411): 3
2026-02-04
ReconScanning (node.9c1411): 9
AttemptLogin (node.368407): 4
IntrusionUserCompromise (node.40929a): 1
2026-02-03
AttemptLogin (node.368407): 2
ReconScanning (node.9c1411): 7
2026-02-02
AttemptLogin (node.368407): 5
2026-02-01
AttemptLogin (node.368407): 15
2026-01-31
AttemptLogin (node.368407): 5
2026-01-30
AttemptLogin (node.368407): 4
IntrusionUserCompromise (node.40929a): 1
2026-01-29
AttemptLogin (node.368407): 8
2026-01-24
AttemptLogin (node.368407): 20
2026-01-23
AttemptLogin (node.368407): 64
DShield reports (IP summary, reports)
2026-01-19
Number of reports: 17
Distinct targets: 17
2026-01-20
Number of reports: 17
Distinct targets: 17
2026-01-21
Number of reports: 20
Distinct targets: 20
2026-01-22
Number of reports: 21
Distinct targets: 20
2026-01-23
Number of reports: 97
Distinct targets: 75
2026-01-24
Number of reports: 97
Distinct targets: 75
2026-01-25
Number of reports: 78
Distinct targets: 60
2026-01-26
Number of reports: 78
Distinct targets: 60
2026-03-09
Number of reports: 11
Distinct targets: 3
Origin AS
AS36352 - AS-COLOCROSSING
BGP Prefix
104.168.92.0/24
geo
United States, Los Angeles
🕑 America/Los_Angeles
hostname
104-168-92-214-host.colocrossing.com
hostname_class
['ip_in_hostname']
Address block ('inetnum' or 'NetRange' in whois database)
104.168.0.0 - 104.168.127.255
last_activity
2026-04-07 08:43:30
last_warden_event
2026-04-07 08:43:30
rep
0.7448387475240797
reserved_range
0
Shodan's InternetDB
Open ports: 22
Tags: –
CPEs: cpe:/a:openbsd:openssh:9.6p1, cpe:/o:canonical:ubuntu_linux
ts_added
2026-01-19 03:52:15.620000
ts_last_update
2026-04-07 08:44:13.739000

Warden event timeline

DShield event timeline

Presence on blacklists