IP address


.000167.172.132.244
Shodan(more info)
Passive DNS
Tags:
IP blacklists
CI Army
167.172.132.244 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2025-02-18 03:50:01.487000
Was present on blacklist at: 2025-02-08 03:50, 2025-02-09 03:50, 2025-02-10 03:50, 2025-02-11 03:50, 2025-02-12 03:50, 2025-02-13 03:50, 2025-02-14 03:50, 2025-02-15 03:50, 2025-02-16 03:50, 2025-02-17 03:50, 2025-02-18 03:50
Spamhaus XBL CBL
167.172.132.244 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-04-29 02:13:30.603000
Was present on blacklist at: 2025-02-04 02:13, 2025-02-11 02:13
Turris greylist
167.172.132.244 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-02-09 22:15:00.177000
Was present on blacklist at: 2025-02-05 22:15, 2025-02-08 22:15, 2025-02-09 22:15
AbuseIPDB
167.172.132.244 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-02-13 05:00:00.737000
Was present on blacklist at: 2025-02-13 05:00
DataPlane VNC RFB
167.172.132.244 is listed on the DataPlane VNC RFB blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs initiating<br>an unsolicited VNC remote frame buffer (RFB) session to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2025-02-22 11:10:00.896000
Was present on blacklist at: 2025-02-15 15:10, 2025-02-15 19:10, 2025-02-15 23:10, 2025-02-16 03:10, 2025-02-16 07:10, 2025-02-16 11:10, 2025-02-16 15:10, 2025-02-16 19:10, 2025-02-16 23:10, 2025-02-17 03:10, 2025-02-17 07:10, 2025-02-17 11:10, 2025-02-17 15:10, 2025-02-17 19:10, 2025-02-17 23:10, 2025-02-18 03:10, 2025-02-18 07:10, 2025-02-18 11:10, 2025-02-18 15:10, 2025-02-18 19:10, 2025-02-18 23:10, 2025-02-19 03:10, 2025-02-19 07:10, 2025-02-19 11:10, 2025-02-19 15:10, 2025-02-19 19:10, 2025-02-19 23:10, 2025-02-20 03:10, 2025-02-20 07:10, 2025-02-20 11:10, 2025-02-20 15:10, 2025-02-20 19:10, 2025-02-20 23:10, 2025-02-21 03:10, 2025-02-21 07:10, 2025-02-21 11:10, 2025-02-21 15:10, 2025-02-21 19:10, 2025-02-21 23:10, 2025-02-22 03:10, 2025-02-22 07:10, 2025-02-22 11:10
blocklist.de IMAP
167.172.132.244 is listed on the blocklist.de IMAP blacklist.

Description: Blocklist.de feed is a free and voluntary service<br>provided by a Fraud/Abuse-specialist. IPs performing attacks<br>on the Service imap, sasl, pop3.
Type of feed: primary (feed detail page)

Last checked at: 2025-02-10 23:05:00.316000
Was present on blacklist at: 2025-02-09 05:05, 2025-02-09 11:05, 2025-02-09 17:05, 2025-02-09 23:05, 2025-02-10 05:05, 2025-02-10 11:05, 2025-02-10 17:05, 2025-02-10 23:05
blocklist.de mail
167.172.132.244 is listed on the blocklist.de mail blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing Mail attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-02-10 23:05:00.434000
Was present on blacklist at: 2025-02-09 05:05, 2025-02-09 11:05, 2025-02-09 17:05, 2025-02-09 23:05, 2025-02-10 05:05, 2025-02-10 11:05, 2025-02-10 17:05, 2025-02-10 23:05
DataPlane SIP query
167.172.132.244 is listed on the DataPlane SIP query blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IP addresses that<br>has been seen initiating an unsolicited SIP OPTIONS query to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2025-02-22 03:10:01.195000
Was present on blacklist at: 2025-02-20 15:10, 2025-02-20 19:10, 2025-02-21 03:10, 2025-02-21 07:10, 2025-02-21 15:10, 2025-02-21 19:10, 2025-02-22 03:10
DShield reports (IP summary, reports)
2025-02-02
Number of reports: 10
Distinct targets: 4
2025-02-07
Number of reports: 14
Distinct targets: 9
2025-02-08
Number of reports: 15
Distinct targets: 7
2025-02-10
Number of reports: 16
Distinct targets: 11
2025-02-12
Number of reports: 53
Distinct targets: 37
2025-02-13
Number of reports: 82
Distinct targets: 30
2025-02-14
Number of reports: 48
Distinct targets: 32
2025-02-15
Number of reports: 31
Distinct targets: 24
2025-02-16
Number of reports: 37
Distinct targets: 25
2025-02-17
Number of reports: 36
Distinct targets: 26
OTX pulses
[5a7e3e70c44e7b48947593a7] 2018-02-10 00:36:00.396000 | Webscanners 2018-02-09 thru current day
Author name:david3
Pulse modified:2025-02-07 19:55:20.314000
Indicator created:2025-01-08 20:35:15
Indicator role:scanning_host
Indicator title:404 NOT FOUND
Indicator expiration:2025-04-08 00:00:00
Origin AS
AS14061 - DIGITALOCEAN-ASN
BGP Prefix
167.172.128.0/20
events
[]
geo
United States, North Bergen
🕑 America/New_York
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
167.172.0.0 - 167.172.255.255
last_activity
2025-02-07 20:00:44.856000
last_warden_event
2025-01-15 19:32:58
rep
0.0
reserved_range
0
Shodan's InternetDB
Open ports: 22
Tags: cloud
CPEs: cpe:/o:canonical:ubuntu_linux, cpe:/a:openbsd:openssh:8.9p1
ts_added
2024-11-26 02:13:24.276000
ts_last_update
2025-05-02 02:13:31.170000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses