IP address
Tags:
Scanner
Login attempts
- IP blacklists
blocklist.de SSH
159.223.9.242 is listed on the blocklist.de SSH blacklist.
Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed:
primary (
feed detail page)
Last checked at:
2025-05-02 22:05:05.250000
Was present on blacklist at:
2025-04-24 16:05,
2025-04-24 22:05,
2025-04-25 04:05,
2025-04-25 10:05,
2025-04-25 16:05,
2025-04-25 22:05,
2025-04-26 04:05,
2025-04-26 10:05,
2025-04-26 16:05,
2025-04-26 22:05,
2025-04-27 04:05,
2025-04-27 10:05,
2025-04-27 16:05,
2025-04-27 22:05,
2025-04-28 04:05,
2025-04-28 10:05,
2025-04-28 16:05,
2025-04-28 22:05,
2025-04-29 04:05,
2025-04-29 10:05,
2025-04-29 22:05,
2025-04-30 04:05,
2025-04-30 10:05,
2025-04-30 16:05,
2025-04-30 22:05,
2025-05-01 04:05,
2025-05-01 10:05,
2025-05-01 16:05,
2025-05-01 22:05,
2025-05-02 04:05,
2025-05-02 10:05,
2025-05-02 16:05,
2025-05-02 22:05
UCEPROTECT L1
159.223.9.242 is listed on the UCEPROTECT L1 blacklist.
Description: UCEPROTECT-NETWORK list of spam IPs.
Type of feed:
primary (
feed detail page)
Last checked at:
2025-05-05 23:45:00.523000
Was present on blacklist at:
2025-04-24 23:45,
2025-04-25 07:45,
2025-04-25 15:45,
2025-04-25 23:45,
2025-04-26 07:45,
2025-04-26 15:45,
2025-04-26 23:45,
2025-04-27 07:45,
2025-04-27 15:45,
2025-04-27 23:45,
2025-04-28 07:45,
2025-04-28 15:45,
2025-04-28 23:45,
2025-04-29 07:45,
2025-04-29 15:45,
2025-04-29 23:45,
2025-04-30 07:45,
2025-04-30 15:45,
2025-04-30 23:45,
2025-05-01 07:45,
2025-05-01 15:45,
2025-05-01 23:45,
2025-05-02 07:45,
2025-05-02 15:45,
2025-05-02 23:45,
2025-05-03 07:45,
2025-05-03 15:45,
2025-05-03 23:45,
2025-05-04 07:45,
2025-05-04 15:45,
2025-05-04 23:45,
2025-05-05 07:45,
2025-05-05 15:45,
2025-05-05 23:45
DataPlane SSH login
159.223.9.242 is listed on the DataPlane SSH login blacklist.
Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed:
primary (
feed detail page)
Last checked at:
2025-05-06 02:10:06.464000
Was present on blacklist at:
2025-04-25 02:10,
2025-04-25 06:10,
2025-04-25 10:10,
2025-04-25 14:10,
2025-04-25 18:10,
2025-04-25 22:10,
2025-04-26 02:10,
2025-04-26 06:10,
2025-04-26 10:10,
2025-04-26 14:10,
2025-04-26 18:10,
2025-04-26 22:10,
2025-04-27 02:10,
2025-04-27 06:10,
2025-04-27 10:10,
2025-04-27 14:10,
2025-04-27 18:10,
2025-04-27 22:10,
2025-04-28 02:10,
2025-04-28 06:10,
2025-04-28 10:10,
2025-04-28 14:10,
2025-04-28 18:10,
2025-04-28 22:10,
2025-04-29 02:10,
2025-04-29 06:10,
2025-04-29 10:10,
2025-04-29 14:10,
2025-04-29 18:10,
2025-04-29 22:10,
2025-04-30 02:10,
2025-04-30 06:10,
2025-04-30 10:10,
2025-04-30 14:10,
2025-04-30 18:10,
2025-04-30 22:10,
2025-05-01 02:10,
2025-05-01 06:10,
2025-05-01 10:10,
2025-05-01 14:10,
2025-05-01 18:10,
2025-05-01 22:10,
2025-05-02 02:10,
2025-05-02 06:10,
2025-05-02 10:10,
2025-05-02 14:10,
2025-05-02 18:10,
2025-05-02 22:10,
2025-05-03 02:10,
2025-05-03 06:10,
2025-05-03 10:10,
2025-05-03 14:10,
2025-05-03 18:10,
2025-05-03 22:10,
2025-05-04 02:10,
2025-05-04 06:10,
2025-05-04 10:10,
2025-05-04 14:10,
2025-05-04 18:10,
2025-05-04 22:10,
2025-05-05 02:10,
2025-05-05 06:10,
2025-05-05 10:10,
2025-05-05 14:10,
2025-05-05 18:10,
2025-05-05 22:10,
2025-05-06 02:10
BruteForceBlocker
159.223.9.242 is listed on the BruteForceBlocker blacklist.
Description: Daniel Gerzo's BruteForceBlocker. The list is made by perl script,<br>that works along with pf - OpenBSD's firewall and it's main<br>purpose is to block SSH bruteforce attacks via firewall.
Type of feed:
primary (
feed detail page)
Last checked at:
2025-05-06 02:52:00.242000
Was present on blacklist at:
2025-04-25 02:52,
2025-04-26 02:52,
2025-04-27 02:52,
2025-04-28 02:52,
2025-04-29 02:52,
2025-04-30 02:52,
2025-05-01 02:52,
2025-05-02 02:52,
2025-05-03 02:52,
2025-05-04 02:52,
2025-05-05 02:52,
2025-05-06 02:52
AbuseIPDB
159.223.9.242 is listed on the AbuseIPDB blacklist.
Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed:
primary (
feed detail page)
Last checked at:
2025-05-01 04:00:00.620000
Was present on blacklist at:
2025-04-25 04:00,
2025-04-26 04:00,
2025-04-27 04:00,
2025-04-28 04:00,
2025-04-29 04:00,
2025-04-30 04:00,
2025-05-01 04:00
FireHOL anonymizers
159.223.9.242 is listed on the FireHOL anonymizers blacklist.
Description: List of anonymizing IPs, aggregated from multiple lists by FireHOL.
Type of feed:
secondary (
feed detail page)
Last checked at:
2025-05-05 12:05:09
Was present on blacklist at:
2025-05-02 12:05,
2025-05-03 12:05,
2025-05-04 12:05,
2025-05-05 12:05
blocklist.de SIP
159.223.9.242 is listed on the blocklist.de SIP blacklist.
Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IP addresses that tried to login in a SIP,<br>VOIP or Asterisk Server.
Type of feed:
primary (
feed detail page)
Last checked at:
2025-05-05 22:05:00.288000
Was present on blacklist at:
2025-05-03 04:05,
2025-05-03 10:05,
2025-05-03 16:05,
2025-05-03 22:05,
2025-05-04 04:05,
2025-05-04 10:05,
2025-05-04 16:05,
2025-05-04 22:05,
2025-05-05 04:05,
2025-05-05 10:05,
2025-05-05 16:05,
2025-05-05 22:05
- Warden events (211)
- 2025-05-01
-
-
AnomalyTraffic (node.ffe95c): 2
-
ReconScanning (node.368407): 3
-
ReconScanning (node.4dc198): 2
- 2025-04-30
-
-
ReconScanning (node.368407): 3
-
ReconScanning (node.4dc198): 5
-
AnomalyTraffic (node.ffe95c): 1
- 2025-04-29
-
-
AnomalyTraffic (node.ffe95c): 3
-
ReconScanning (node.368407): 4
-
ReconScanning (node.4dc198): 4
-
AttemptLogin (node.b7f4d1): 61
-
IntrusionUserCompromise (node.b7f4d1): 6
- 2025-04-28
-
-
AnomalyTraffic (node.ffe95c): 2
-
ReconScanning (node.368407): 4
-
ReconScanning (node.4dc198): 4
-
AttemptLogin (node.00aee5): 61
-
IntrusionUserCompromise (node.00aee5): 6
- 2025-04-27
-
-
AnomalyTraffic (node.ffe95c): 3
-
ReconScanning (node.368407): 3
-
ReconScanning (node.4dc198): 3
- 2025-04-26
-
-
AnomalyTraffic (node.ffe95c): 4
-
ReconScanning (node.4dc198): 3
-
ReconScanning (node.368407): 6
- 2025-04-25
-
-
AnomalyTraffic (node.ffe95c): 3
-
ReconScanning (node.368407): 4
-
ReconScanning (node.4dc198): 3
- 2025-04-24
-
-
AnomalyTraffic (node.ffe95c): 3
-
ReconScanning (node.4dc198): 3
-
ReconScanning (node.368407): 2
- DShield reports (IP summary, reports)
- 2025-04-24
- Number of reports: 383
- Distinct targets: 15
- 2025-04-25
- Number of reports: 1134
- Distinct targets: 28
- 2025-04-26
- Number of reports: 1309
- Distinct targets: 26
- 2025-04-27
- Number of reports: 1152
- Distinct targets: 29
- 2025-04-28
- Number of reports: 1846
- Distinct targets: 27
- 2025-04-29
- Number of reports: 894
- Distinct targets: 24
- 2025-04-30
- Number of reports: 891
- Distinct targets: 19
- 2025-05-01
- Number of reports: 797
- Distinct targets: 14
- Origin AS
- AS14061 - DIGITALOCEAN-ASN
- BGP Prefix
- 159.223.0.0/20
- geo
-
Netherlands, Amsterdam
- 🕑 Europe/Amsterdam
- hostname
- (null)
- Address block ('inetnum' or 'NetRange' in whois database)
- 159.223.0.0 - 159.223.255.255
- last_activity
- 2025-05-01 11:46:43
- last_warden_event
- 2025-05-01 11:46:43
- rep
- 0.4412314278738839
- reserved_range
- 0
- Shodan's InternetDB
- Open ports: 22, 5432
- Tags: cloud, database
- CPEs: cpe:/a:openbsd:openssh:9.0p1, cpe:/a:postgresql:postgresql:14, cpe:/o:canonical:ubuntu_linux
- ts_added
- 2025-04-24 10:24:16.427000
- ts_last_update
- 2025-05-06 02:52:04.001000
Warden event timeline
DShield event timeline
Presence on blacklists