IP address


.072134.122.49.42
Shodan(more info)
Passive DNS
Tags: Login attempts Malware Scanner
IP blacklists
DataPlane SSH login
134.122.49.42 is listed on the DataPlane SSH login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-15 19:10:06.145000
Was present on blacklist at: 2025-11-24 19:10, 2025-11-25 03:10, 2025-11-25 07:10, 2025-11-25 15:10, 2025-11-25 19:10, 2025-11-26 03:10, 2025-11-26 07:10, 2025-11-26 15:10, 2025-11-26 19:10, 2025-11-27 03:10, 2025-11-27 07:10, 2025-11-27 15:10, 2025-11-27 19:10, 2025-11-28 03:10, 2025-11-28 07:10, 2025-11-28 15:10, 2025-11-28 19:10, 2025-11-29 03:10, 2025-11-29 07:10, 2025-11-29 15:10, 2025-11-29 19:10, 2025-11-30 03:10, 2025-11-30 07:10, 2025-11-30 15:10, 2025-11-30 19:10, 2025-12-01 03:10, 2025-12-01 07:10, 2025-12-01 15:10, 2025-12-09 03:10, 2025-12-09 07:10, 2025-12-09 15:10, 2025-12-09 19:10, 2025-12-10 03:10, 2025-12-10 07:10, 2025-12-10 15:10, 2025-12-10 19:10, 2025-12-11 03:10, 2025-12-11 07:10, 2025-12-11 15:10, 2025-12-11 19:10, 2025-12-12 03:10, 2025-12-12 07:10, 2025-12-12 15:10, 2025-12-12 19:10, 2025-12-13 03:10, 2025-12-13 07:10, 2025-12-13 15:10, 2025-12-13 19:10, 2025-12-14 03:10, 2025-12-14 07:10, 2025-12-14 15:10, 2025-12-14 19:10, 2025-12-15 03:10, 2025-12-15 07:10, 2025-12-15 15:10, 2025-12-15 19:10
Spamhaus XBL CBL
134.122.49.42 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-15 16:22:50.103000
Was present on blacklist at: 2025-12-08 16:22, 2025-12-15 16:22
blocklist.de SSH
134.122.49.42 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-10 17:05:05.183000
Was present on blacklist at: 2025-12-08 23:05, 2025-12-09 05:05, 2025-12-09 11:05, 2025-12-09 17:05, 2025-12-09 23:05, 2025-12-10 05:05, 2025-12-10 11:05, 2025-12-10 17:05
Warden events (68)
2025-12-13
ReconScanning (node.9c1411): 5
2025-12-11
ReconScanning (node.9c1411): 6
2025-12-08
ReconScanning (node.368407): 1
2025-11-24
IntrusionUserCompromise (node.985fb4): 15
Malware (node.985fb4): 15
AttemptLogin (node.985fb4): 26
DShield reports (IP summary, reports)
2025-12-08
Number of reports: 912
Distinct targets: 4
Origin AS
AS14061 - DIGITALOCEAN-ASN
BGP Prefix
134.122.48.0/20
geo
Netherlands, Amsterdam
🕑 Europe/Amsterdam
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
134.122.0.0 - 134.122.127.255
last_activity
2025-12-13 23:13:28
last_warden_event
2025-12-13 23:13:28
rep
0.07217261904761904
reserved_range
0
Shodan's InternetDB
Open ports: 22, 23, 24, 26, 66, 79, 80, 88, 100, 102, 104, 119, 441, 442, 443, 800, 1022, 1443, 2000, 2022, 4000, 4433, 4530, 4840, 5010, 5100, 5242, 8008, 8039, 8080, 8407, 8440, 8441, 8442, 8818, 8908, 9028, 9042, 9214, 9242, 9930, 9999, 20106, 20202, 20208, 45006
Tags: cloud
CPEs: cpe:/a:openbsd:openssh:8.2p1, cpe:/o:canonical:ubuntu_linux
ts_added
2025-11-24 16:22:44.128000
ts_last_update
2025-12-19 16:22:50.077000

Warden event timeline

DShield event timeline

Presence on blacklists