IP address


.061170.205.37.134box.sshjunkie.com
Shodan(more info)
Passive DNS
Tags:
IP blacklists
DataPlane SSH login
170.205.37.134 is listed on the DataPlane SSH login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-22 07:10:02.001000
Was present on blacklist at: 2025-12-15 15:10, 2025-12-15 19:10, 2025-12-16 03:10, 2025-12-16 07:10, 2025-12-16 15:10, 2025-12-16 19:10, 2025-12-17 03:10, 2025-12-17 07:10, 2025-12-17 15:10, 2025-12-17 19:10, 2025-12-18 03:10, 2025-12-18 07:10, 2025-12-18 15:10, 2025-12-18 19:10, 2025-12-19 03:10, 2025-12-19 07:10, 2025-12-19 15:10, 2025-12-19 19:10, 2025-12-20 03:10, 2025-12-20 07:10, 2025-12-20 15:10, 2025-12-20 19:10, 2025-12-21 03:10, 2025-12-21 07:10, 2025-12-21 15:10, 2025-12-21 19:10, 2025-12-22 03:10, 2025-12-22 07:10
blocklist.de SSH
170.205.37.134 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-18 17:05:00.380000
Was present on blacklist at: 2025-12-15 17:05, 2025-12-15 23:05, 2025-12-16 05:05, 2025-12-16 11:05, 2025-12-16 17:05, 2025-12-16 23:05, 2025-12-17 05:05, 2025-12-17 11:05, 2025-12-17 17:05, 2025-12-17 23:05, 2025-12-18 05:05, 2025-12-18 11:05, 2025-12-18 17:05
Blocklist.net.ua
170.205.37.134 is listed on the Blocklist.net.ua blacklist.

Description: BlockList contains IP addresses that perform attacks,<br>send spam or brute force passwords to the blocking list.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-16 15:15:01.292000
Was present on blacklist at: 2025-12-15 19:15, 2025-12-15 23:15, 2025-12-16 03:15, 2025-12-16 07:15, 2025-12-16 11:15, 2025-12-16 15:15
AbuseIPDB
170.205.37.134 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-12-16 05:00:00.711000
Was present on blacklist at: 2025-12-16 05:00
Turris greylist
170.205.37.134 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-17 22:15:00.159000
Was present on blacklist at: 2025-12-17 22:15
Warden events (4)
2025-12-16
AttemptLogin (node.40929a): 1
IntrusionUserCompromise (node.40929a): 1
2025-12-15
AttemptLogin (node.40929a): 1
IntrusionUserCompromise (node.40929a): 1
DShield reports (IP summary, reports)
2025-12-19
Number of reports: 97
Distinct targets: 30
2025-12-20
Number of reports: 96
Distinct targets: 24
Origin AS
AS63473 - HOSTHATCH
BGP Prefix
170.205.37.0/24
geo
United States, New York
🕑 America/New_York
hostname
box.sshjunkie.com
Address block ('inetnum' or 'NetRange' in whois database)
170.205.36.0 - 170.205.39.255
last_activity
2025-12-16 16:34:51.345000
last_warden_event
2025-12-16 16:34:51.345000
rep
0.06071428571428572
reserved_range
0
Shodan's InternetDB
Open ports: 22, 80, 3000, 5555, 8443, 8888, 8999
Tags: self-signed
CPEs: cpe:/a:getbootstrap:bootstrap, cpe:/a:jquery:jquery, cpe:/o:canonical:ubuntu_linux, cpe:/a:f5:nginx:1.28.0, cpe:/a:openbsd:openssh:9.6p1, cpe:/a:nodejs:node.js, cpe:/a:expressjs:express, cpe:/a:f5:nginx, cpe:/a:php:php:8.3.24
ts_added
2025-12-15 15:23:29.162000
ts_last_update
2025-12-22 07:23:07.161000

Warden event timeline

DShield event timeline

Presence on blacklists