IP address


.075134.122.55.141
Shodan(more info)
Passive DNS
Tags:
IP blacklists
blocklist.de SSH
134.122.55.141 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-18 05:05:00.665000
Was present on blacklist at: 2025-12-17 17:05, 2025-12-17 23:05, 2025-12-18 05:05
DataPlane SSH login
134.122.55.141 is listed on the DataPlane SSH login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-20 07:10:06.289000
Was present on blacklist at: 2025-12-17 19:10, 2025-12-18 03:10, 2025-12-18 07:10, 2025-12-18 15:10, 2025-12-18 19:10, 2025-12-19 03:10, 2025-12-19 07:10, 2025-12-19 15:10, 2025-12-19 19:10, 2025-12-20 03:10, 2025-12-20 07:10
AbuseIPDB
134.122.55.141 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-12-18 05:00:00.690000
Was present on blacklist at: 2025-12-18 05:00
blocklist.de web-login
134.122.55.141 is listed on the blocklist.de web-login blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-20 05:05:00.417000
Was present on blacklist at: 2025-12-18 11:05, 2025-12-18 17:05, 2025-12-18 23:05, 2025-12-19 05:05, 2025-12-19 11:05, 2025-12-19 17:05, 2025-12-19 23:05, 2025-12-20 05:05
blocklist.de Apache
134.122.55.141 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-20 05:05:05.329000
Was present on blacklist at: 2025-12-18 11:05, 2025-12-18 17:05, 2025-12-18 23:05, 2025-12-19 05:05, 2025-12-19 11:05, 2025-12-19 17:05, 2025-12-19 23:05, 2025-12-20 05:05
Warden events (3)
2025-12-17
AnomalyTraffic (node.ffe95c): 2
ReconScanning (node.4dc198): 1
DShield reports (IP summary, reports)
2025-12-17
Number of reports: 527
Distinct targets: 7
2025-12-18
Number of reports: 527
Distinct targets: 7
Origin AS
AS14061 - DIGITALOCEAN-ASN
BGP Prefix
134.122.48.0/20
geo
Netherlands, Amsterdam
🕑 Europe/Amsterdam
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
134.122.0.0 - 134.122.127.255
last_activity
2025-12-17 14:38:10
last_warden_event
2025-12-17 14:38:10
rep
0.075
reserved_range
0
Shodan's InternetDB
Open ports: 22, 53, 443, 465
Tags: self-signed, cloud
CPEs: cpe:/o:linux:linux_kernel, cpe:/a:openbsd:openssh:9.2p1, cpe:/o:debian:debian_linux
ts_added
2025-12-17 14:37:06.369000
ts_last_update
2025-12-20 07:15:30.389000

Warden event timeline

DShield event timeline

Presence on blacklists