IP address


--149.56.127.123pf-ca2.telecomnetworks.net
Shodan(more info)
Passive DNS
Tags:
IP blacklists
blocklist.de web-login
149.56.127.123 is listed on the blocklist.de web-login blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)

Last checked at: 2025-04-25 04:05:00.241000
Was present on blacklist at: 2025-04-23 10:05, 2025-04-23 16:05, 2025-04-23 22:05, 2025-04-24 04:05, 2025-04-24 10:05, 2025-04-24 16:05, 2025-04-24 22:05, 2025-04-25 04:05
Spamhaus SBL CSS
149.56.127.123 is listed on the Spamhaus SBL CSS blacklist.

Description: The Spamhaus CSS is part of the SBL. CSS listings will have return code 127.0.0.3 to differentiate from regular SBL listings, which have return code 127.0.0.2.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-04-23 10:05:20.986000
Was present on blacklist at: 2025-04-23 10:05
Spamhaus XBL CBL
149.56.127.123 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-04-23 10:05:20.986000
Was present on blacklist at: 2025-04-23 10:05
blocklist.de Apache
149.56.127.123 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-04-25 04:05:05.294000
Was present on blacklist at: 2025-04-23 10:05, 2025-04-23 16:05, 2025-04-23 22:05, 2025-04-24 04:05, 2025-04-24 10:05, 2025-04-24 16:05, 2025-04-24 22:05, 2025-04-25 04:05
AbuseIPDB
149.56.127.123 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-04-26 04:00:00.654000
Was present on blacklist at: 2025-04-25 04:00, 2025-04-26 04:00
Blocklist.net.ua
149.56.127.123 is listed on the Blocklist.net.ua blacklist.

Description: BlockList contains IP addresses that perform attacks,<br>send spam or brute force passwords to the blocking list.
Type of feed: primary (feed detail page)

Last checked at: 2025-04-28 10:15:02.277000
Was present on blacklist at: 2025-04-25 10:15, 2025-04-25 14:15, 2025-04-25 18:15, 2025-04-25 22:15, 2025-04-26 02:15, 2025-04-26 06:15, 2025-04-26 10:15, 2025-04-26 14:15, 2025-04-26 18:15, 2025-04-26 22:15, 2025-04-27 02:15, 2025-04-27 06:15, 2025-04-27 10:15, 2025-04-27 14:15, 2025-04-27 18:15, 2025-04-27 22:15, 2025-04-28 02:15, 2025-04-28 06:15, 2025-04-28 10:15
DShield reports (IP summary, reports)
2025-04-25
Number of reports: 20
Distinct targets: 9
Origin AS
AS16276 - OVH
BGP Prefix
149.56.0.0/16
geo
Canada, Montreal
🕑 America/Toronto
hostname
pf-ca2.telecomnetworks.net
Address block ('inetnum' or 'NetRange' in whois database)
149.56.0.0 - 149.56.255.255
reserved_range
0
Shodan's InternetDB
Open ports: 80, 443
Tags: eol-product
CPEs: cpe:/a:jquery:jquery, cpe:/a:php:php, cpe:/a:mysql:mysql, cpe:/a:wordpress:wordpress:6.5.5, cpe:/a:f5:nginx:1.14.2
ts_added
2025-04-23 10:05:20.657000
ts_last_update
2025-04-28 10:34:01.103000

Warden event timeline

DShield event timeline

Presence on blacklists