IP address
Tags:
Login attempts
Malware
Scanner
- IP blacklists
DataPlane SSH login
134.122.49.42 is listed on the DataPlane SSH login blacklist.
Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed:
primary (
feed detail page)
Last checked at:
2025-12-15 19:10:06.145000
Was present on blacklist at:
2025-11-24 19:10,
2025-11-25 03:10,
2025-11-25 07:10,
2025-11-25 15:10,
2025-11-25 19:10,
2025-11-26 03:10,
2025-11-26 07:10,
2025-11-26 15:10,
2025-11-26 19:10,
2025-11-27 03:10,
2025-11-27 07:10,
2025-11-27 15:10,
2025-11-27 19:10,
2025-11-28 03:10,
2025-11-28 07:10,
2025-11-28 15:10,
2025-11-28 19:10,
2025-11-29 03:10,
2025-11-29 07:10,
2025-11-29 15:10,
2025-11-29 19:10,
2025-11-30 03:10,
2025-11-30 07:10,
2025-11-30 15:10,
2025-11-30 19:10,
2025-12-01 03:10,
2025-12-01 07:10,
2025-12-01 15:10,
2025-12-09 03:10,
2025-12-09 07:10,
2025-12-09 15:10,
2025-12-09 19:10,
2025-12-10 03:10,
2025-12-10 07:10,
2025-12-10 15:10,
2025-12-10 19:10,
2025-12-11 03:10,
2025-12-11 07:10,
2025-12-11 15:10,
2025-12-11 19:10,
2025-12-12 03:10,
2025-12-12 07:10,
2025-12-12 15:10,
2025-12-12 19:10,
2025-12-13 03:10,
2025-12-13 07:10,
2025-12-13 15:10,
2025-12-13 19:10,
2025-12-14 03:10,
2025-12-14 07:10,
2025-12-14 15:10,
2025-12-14 19:10,
2025-12-15 03:10,
2025-12-15 07:10,
2025-12-15 15:10,
2025-12-15 19:10
Spamhaus XBL CBL
134.122.49.42 is listed on the Spamhaus XBL CBL blacklist.
Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed:
secondary (DNSBL) (
feed detail page)
Last checked at:
2025-12-15 16:22:50.103000
Was present on blacklist at:
2025-12-08 16:22,
2025-12-15 16:22
blocklist.de SSH
134.122.49.42 is listed on the blocklist.de SSH blacklist.
Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed:
primary (
feed detail page)
Last checked at:
2025-12-10 17:05:05.183000
Was present on blacklist at:
2025-12-08 23:05,
2025-12-09 05:05,
2025-12-09 11:05,
2025-12-09 17:05,
2025-12-09 23:05,
2025-12-10 05:05,
2025-12-10 11:05,
2025-12-10 17:05
- Warden events (68)
- 2025-12-13
-
-
ReconScanning (node.9c1411): 5
- 2025-12-11
-
-
ReconScanning (node.9c1411): 6
- 2025-12-08
-
-
ReconScanning (node.368407): 1
- 2025-11-24
-
-
IntrusionUserCompromise (node.985fb4): 15
-
Malware (node.985fb4): 15
-
AttemptLogin (node.985fb4): 26
- DShield reports (IP summary, reports)
- 2025-12-08
- Number of reports: 912
- Distinct targets: 4
- Origin AS
- AS14061 - DIGITALOCEAN-ASN
- BGP Prefix
- 134.122.48.0/20
- geo
-
Netherlands, Amsterdam
- 🕑 Europe/Amsterdam
- hostname
- (null)
- Address block ('inetnum' or 'NetRange' in whois database)
- 134.122.0.0 - 134.122.127.255
- last_activity
- 2025-12-13 23:13:28
- last_warden_event
- 2025-12-13 23:13:28
- rep
- 0.07217261904761904
- reserved_range
- 0
- Shodan's InternetDB
- Open ports: 22, 23, 24, 26, 66, 79, 80, 88, 100, 102, 104, 119, 441, 442, 443, 800, 1022, 1443, 2000, 2022, 4000, 4433, 4530, 4840, 5010, 5100, 5242, 8008, 8039, 8080, 8407, 8440, 8441, 8442, 8818, 8908, 9028, 9042, 9214, 9242, 9930, 9999, 20106, 20202, 20208, 45006
- Tags: cloud
- CPEs: cpe:/a:openbsd:openssh:8.2p1, cpe:/o:canonical:ubuntu_linux
- ts_added
- 2025-11-24 16:22:44.128000
- ts_last_update
- 2025-12-19 16:22:50.077000
Warden event timeline
DShield event timeline
Presence on blacklists