IP address


.000134.209.252.145
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
blocklist.de web-login
134.209.252.145 is listed on the blocklist.de web-login blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)

Last checked at: 2025-03-20 11:05:05.376000
Was present on blacklist at: 2025-03-18 17:05, 2025-03-18 23:05, 2025-03-19 05:05, 2025-03-19 11:05, 2025-03-19 17:05, 2025-03-19 23:05, 2025-03-20 05:05, 2025-03-20 11:05
blocklist.de Apache
134.209.252.145 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-03-20 11:05:05.583000
Was present on blacklist at: 2025-03-18 17:05, 2025-03-18 23:05, 2025-03-19 05:05, 2025-03-19 11:05, 2025-03-19 17:05, 2025-03-19 23:05, 2025-03-20 05:05, 2025-03-20 11:05
Turris greylist
134.209.252.145 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-03-21 22:15:00.264000
Was present on blacklist at: 2025-03-19 22:15, 2025-03-21 22:15
AbuseIPDB
134.209.252.145 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-03-21 05:00:00.409000
Was present on blacklist at: 2025-03-20 05:00, 2025-03-21 05:00
Spamhaus XBL CBL
134.209.252.145 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-05-03 16:37:50.366000
Was present on blacklist at: 2025-03-22 16:37
Warden events (260)
2025-03-22
ReconScanning (node.9c1411): 23
2025-03-21
ReconScanning (node.9c1411): 55
2025-03-20
ReconScanning (node.9c1411): 75
2025-03-19
ReconScanning (node.9c1411): 76
ReconScanning (node.4dc198): 3
2025-03-18
ReconScanning (node.9c1411): 23
ReconScanning (node.4dc198): 5
DShield reports (IP summary, reports)
2025-03-18
Number of reports: 67
Distinct targets: 47
2025-03-19
Number of reports: 162
Distinct targets: 104
2025-03-20
Number of reports: 136
Distinct targets: 104
2025-03-21
Number of reports: 31
Distinct targets: 21
OTX pulses
[5a7e3e70c44e7b48947593a7] 2018-02-10 00:36:00.396000 | Webscanners 2018-02-09 thru current day
Author name:david3
Pulse modified:2025-04-17 19:55:21.800000
Indicator created:2025-03-18 23:15:23
Indicator role:scanning_host
Indicator title:404 NOT FOUND
Indicator expiration:2025-06-16 00:00:00
Origin AS
AS14061 - DIGITALOCEAN-ASN
BGP Prefix
134.209.240.0/20
geo
Germany, Frankfurt am Main
🕑 Europe/Berlin
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
134.209.0.0 - 134.209.255.255
last_activity
2025-04-17 20:01:49.958000
last_warden_event
2025-03-22 08:45:15
rep
0.0
reserved_range
0
Shodan's InternetDB
Open ports: 123, 25084
Tags: cloud
CPEs: cpe:/o:linux:linux_kernel, cpe:/a:openbsd:openssh:7.9p1, cpe:/o:debian:debian_linux
ts_added
2024-11-09 16:37:40.711000
ts_last_update
2025-05-07 16:37:50.347000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses