IP address


--172.94.9.39
Shodan(more info)
Passive DNS
Tags:
IP blacklists
AbuseIPDB
172.94.9.39 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-02-21 05:00:00.592000
Was present on blacklist at: 2026-02-12 05:00, 2026-02-15 05:00, 2026-02-16 05:00, 2026-02-17 05:00, 2026-02-18 05:00, 2026-02-19 05:00, 2026-02-20 05:00, 2026-02-21 05:00
Spamhaus SBL
172.94.9.39 is listed on the Spamhaus SBL blacklist.

Description: The Spamhaus Block List ("SBL") Advisory is a database of IP addresses from which Spamhaus does not recommend the acceptance of electronic mail.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-03-19 05:02:09.773000
Was present on blacklist at: 2026-02-12 05:01, 2026-02-19 05:01, 2026-02-26 05:01, 2026-03-05 05:01, 2026-03-12 05:01, 2026-03-19 05:02
Spamhaus DROP
172.94.9.39 is listed on the Spamhaus DROP blacklist.

Description: Spamhaus DROP (Don't Route Or Peer) list. Netblocks controlled by spammers or cyber criminals. The DROP lists are a tiny subset of the SBL, designed for use by firewalls and routing equipment to filter out the malicious traffic from these netblocks.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-03-19 05:02:09.773000
Was present on blacklist at: 2026-02-12 05:01, 2026-02-19 05:01, 2026-02-26 05:01, 2026-03-05 05:01, 2026-03-12 05:01, 2026-03-19 05:02
DataPlane VNC RFB
172.94.9.39 is listed on the DataPlane VNC RFB blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs initiating<br>an unsolicited VNC remote frame buffer (RFB) session to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-04 11:10:01.074000
Was present on blacklist at: 2026-02-16 19:10, 2026-02-16 23:10, 2026-02-17 03:10, 2026-02-17 07:10, 2026-02-17 11:10, 2026-02-17 15:10, 2026-02-17 19:10, 2026-02-17 23:10, 2026-02-18 03:10, 2026-02-18 07:10, 2026-02-18 11:10, 2026-02-18 15:10, 2026-02-18 19:10, 2026-02-18 23:10, 2026-02-19 03:10, 2026-02-19 07:10, 2026-02-19 11:10, 2026-02-19 15:10, 2026-02-19 19:10, 2026-02-19 23:10, 2026-02-20 03:10, 2026-02-20 07:10, 2026-02-20 11:10, 2026-02-20 15:10, 2026-02-20 19:10, 2026-02-20 23:10, 2026-02-21 03:10, 2026-02-21 07:10, 2026-02-21 11:10, 2026-02-21 15:10, 2026-02-21 19:10, 2026-02-21 23:10, 2026-02-22 03:10, 2026-02-22 07:10, 2026-02-22 11:10, 2026-02-22 15:10, 2026-02-22 19:10, 2026-02-22 23:10, 2026-02-23 03:10, 2026-02-23 07:10, 2026-02-23 11:10, 2026-02-23 15:10, 2026-02-23 19:10, 2026-02-23 23:10, 2026-02-24 03:10, 2026-02-26 11:10, 2026-02-26 15:10, 2026-02-26 19:10, 2026-02-26 23:10, 2026-02-27 03:10, 2026-02-27 07:10, 2026-02-27 11:10, 2026-02-27 15:10, 2026-02-27 19:10, 2026-02-27 23:10, 2026-02-28 03:10, 2026-02-28 07:10, 2026-02-28 11:10, 2026-02-28 15:10, 2026-02-28 19:10, 2026-02-28 23:10, 2026-03-01 03:10, 2026-03-01 07:10, 2026-03-01 11:10, 2026-03-01 15:10, 2026-03-01 19:10, 2026-03-01 23:10, 2026-03-02 03:10, 2026-03-02 07:10, 2026-03-02 11:10, 2026-03-02 15:10, 2026-03-02 19:10, 2026-03-02 23:10, 2026-03-03 03:10, 2026-03-03 07:10, 2026-03-03 11:10, 2026-03-03 15:10, 2026-03-03 19:10, 2026-03-03 23:10, 2026-03-04 03:10, 2026-03-04 07:10, 2026-03-04 11:10
Turris greylist
172.94.9.39 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-21 22:15:00.139000
Was present on blacklist at: 2026-02-20 22:15, 2026-02-21 22:15
UCEPROTECT L1
172.94.9.39 is listed on the UCEPROTECT L1 blacklist.

Description: UCEPROTECT-NETWORK list of spam IPs.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-13 00:45:00.667000
Was present on blacklist at: 2026-02-27 08:45, 2026-02-27 16:45, 2026-02-28 08:45, 2026-03-01 16:45, 2026-03-02 08:45, 2026-03-02 16:45, 2026-03-03 00:45, 2026-03-03 08:45, 2026-03-03 16:45, 2026-03-04 00:45, 2026-03-04 08:45, 2026-03-04 16:45, 2026-03-05 00:45, 2026-03-05 08:45, 2026-03-05 16:45, 2026-03-06 00:45, 2026-03-06 08:45, 2026-03-09 08:45, 2026-03-09 16:45, 2026-03-10 00:45, 2026-03-10 08:45, 2026-03-10 16:45, 2026-03-11 00:45, 2026-03-11 08:45, 2026-03-11 16:45, 2026-03-12 00:45, 2026-03-12 08:45, 2026-03-12 16:45, 2026-03-13 00:45
Echelon VNC login
172.94.9.39 is listed on the Echelon VNC login blacklist.

Description: VNC remote desktop login attempt on port 5900/5901
Type of feed: primary (feed detail page)

Last checked at: 2026-03-06 10:45:00.407000
Was present on blacklist at: 2026-03-05 10:45, 2026-03-06 10:45

Threat categories

TLRoleCategoryDetails
38 src

DShield reports (IP summary, reports)
2026-02-24
Number of reports: 171
Distinct targets: 128
2026-02-25
Number of reports: 171
Distinct targets: 128
2026-03-01
Number of reports: 179
Distinct targets: 128
OTX pulses
[69946d83d7c9dffdcb3d5354] 2026-02-17 13:30:43.105000 | VNC honeypot logs for 2026/02/17
Author name:jnazario
Pulse modified:2026-02-17 13:30:43.105000
Indicator created:2026-02-17 13:30:44
Indicator role:None
Indicator title:
Indicator expiration:2026-03-19 13:00:00
[69a19a4143b6787330d231e9] 2026-02-27 13:21:05.716000 | VNC honeypot logs for 2026/02/27
Author name:jnazario
Pulse modified:2026-02-27 13:21:05.716000
Indicator created:2026-02-27 13:21:07
Indicator role:None
Indicator title:
Indicator expiration:2026-03-29 13:00:00
[69a2ebe5a5674eb986d536dd] 2026-02-28 13:21:41.099000 | VNC honeypot logs for 2026/02/28
Author name:jnazario
Pulse modified:2026-02-28 13:21:41.099000
Indicator created:2026-02-28 13:21:42
Indicator role:None
Indicator title:
Indicator expiration:2026-03-30 13:00:00
[69a58ea2b72d0927b17f56e1] 2026-03-02 13:20:34.077000 | VNC honeypot logs for 2026/03/02
Author name:jnazario
Pulse modified:2026-03-02 13:20:34.077000
Indicator created:2026-03-02 13:20:35
Indicator role:None
Indicator title:
Indicator expiration:2026-04-01 13:00:00
Origin AS
AS213790 - LimitedNetwork-AS
AS397373 - H4Y-TECHNOLOGIES
BGP Prefix
172.94.9.0/24
geo
United States
🕑 America/Chicago
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
172.94.0.0 - 172.94.127.255
last_activity
2026-03-02 16:38:15.669000
reserved_range
0
ts_added
2026-02-12 05:01:30.224000
ts_last_update
2026-03-21 05:01:52.055000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses