IP address


--175.214.22.90
Shodan(more info)
Passive DNS
Tags:
IP blacklists
DataPlane VNC RFB
175.214.22.90 is listed on the DataPlane VNC RFB blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs initiating<br>an unsolicited VNC remote frame buffer (RFB) session to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-04 11:10:01.074000
Was present on blacklist at: 2026-02-11 23:10, 2026-02-12 03:10, 2026-02-12 07:10, 2026-02-12 11:10, 2026-02-12 15:10, 2026-02-12 19:10, 2026-02-12 23:10, 2026-02-13 03:10, 2026-02-13 07:10, 2026-02-13 11:10, 2026-02-13 15:10, 2026-02-13 19:10, 2026-02-13 23:10, 2026-02-14 03:10, 2026-02-14 07:10, 2026-02-14 11:10, 2026-02-14 15:10, 2026-02-14 19:10, 2026-02-14 23:10, 2026-02-15 03:10, 2026-02-15 07:10, 2026-02-15 11:10, 2026-02-15 15:10, 2026-02-15 19:10, 2026-02-15 23:10, 2026-02-16 03:10, 2026-02-16 07:10, 2026-02-16 11:10, 2026-02-16 15:10, 2026-02-16 19:10, 2026-02-16 23:10, 2026-02-17 03:10, 2026-02-17 07:10, 2026-02-17 11:10, 2026-02-17 15:10, 2026-02-17 19:10, 2026-02-17 23:10, 2026-02-18 03:10, 2026-02-18 07:10, 2026-02-18 11:10, 2026-02-18 15:10, 2026-02-18 19:10, 2026-02-18 23:10, 2026-02-19 03:10, 2026-02-19 07:10, 2026-02-19 11:10, 2026-02-19 15:10, 2026-02-19 19:10, 2026-02-19 23:10, 2026-02-20 03:10, 2026-02-20 07:10, 2026-02-20 11:10, 2026-02-20 15:10, 2026-02-20 19:10, 2026-02-20 23:10, 2026-02-21 03:10, 2026-02-21 07:10, 2026-02-21 11:10, 2026-02-21 15:10, 2026-02-21 19:10, 2026-02-21 23:10, 2026-02-22 03:10, 2026-02-22 07:10, 2026-02-22 11:10, 2026-02-22 15:10, 2026-02-22 19:10, 2026-02-22 23:10, 2026-02-23 03:10, 2026-02-23 07:10, 2026-02-23 11:10, 2026-02-23 15:10, 2026-02-23 19:10, 2026-02-23 23:10, 2026-02-24 03:10, 2026-02-24 07:10, 2026-02-24 11:10, 2026-02-24 15:10, 2026-02-24 19:10, 2026-02-24 23:10, 2026-02-25 03:10, 2026-02-25 07:10, 2026-02-25 11:10, 2026-02-25 15:10, 2026-02-25 19:10, 2026-02-25 23:10, 2026-02-26 03:10, 2026-02-26 07:10, 2026-02-26 11:10, 2026-02-26 15:10, 2026-02-26 19:10, 2026-02-26 23:10, 2026-02-27 03:10, 2026-02-27 07:10, 2026-02-27 11:10, 2026-02-27 15:10, 2026-02-27 19:10, 2026-02-27 23:10, 2026-02-28 03:10, 2026-02-28 07:10, 2026-02-28 11:10, 2026-02-28 15:10, 2026-02-28 19:10, 2026-02-28 23:10, 2026-03-01 03:10, 2026-03-01 07:10, 2026-03-01 11:10, 2026-03-01 15:10, 2026-03-01 19:10, 2026-03-01 23:10, 2026-03-02 03:10, 2026-03-02 07:10, 2026-03-02 11:10, 2026-03-02 15:10, 2026-03-02 19:10, 2026-03-02 23:10, 2026-03-03 03:10, 2026-03-03 07:10, 2026-03-03 11:10, 2026-03-03 15:10, 2026-03-03 19:10, 2026-03-03 23:10, 2026-03-04 03:10, 2026-03-04 07:10, 2026-03-04 11:10
Spamhaus SBL CSS
175.214.22.90 is listed on the Spamhaus SBL CSS blacklist.

Description: The Spamhaus CSS is part of the SBL. CSS listings will have return code 127.0.0.3 to differentiate from regular SBL listings, which have return code 127.0.0.2.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-04-01 23:10:10.231000
Was present on blacklist at: 2026-02-11 23:10, 2026-02-25 23:10, 2026-03-04 23:10, 2026-03-11 23:10, 2026-03-18 23:10, 2026-03-25 23:10, 2026-04-01 23:10
Spamhaus XBL CBL
175.214.22.90 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-04-01 23:10:10.231000
Was present on blacklist at: 2026-02-11 23:10, 2026-02-18 23:10, 2026-02-25 23:10, 2026-03-04 23:10, 2026-03-11 23:10, 2026-03-18 23:10, 2026-03-25 23:10, 2026-04-01 23:10
Spamhaus PBL
175.214.22.90 is listed on the Spamhaus PBL blacklist.

Description: The Spamhaus PBL is a DNSBL database of end-user IP address ranges which should not be delivering unauthenticated SMTP email to any Internet mail server except those provided for specifically by an ISP for that customer's use.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-04-01 23:10:10.231000
Was present on blacklist at: 2026-02-11 23:10, 2026-02-18 23:10, 2026-02-25 23:10, 2026-03-04 23:10, 2026-03-11 23:10, 2026-03-18 23:10, 2026-03-25 23:10, 2026-04-01 23:10
UCEPROTECT L1
175.214.22.90 is listed on the UCEPROTECT L1 blacklist.

Description: UCEPROTECT-NETWORK list of spam IPs.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-10 08:45:00.862000
Was present on blacklist at: 2026-02-15 00:45, 2026-02-15 08:45, 2026-02-16 00:45, 2026-02-16 16:45, 2026-02-17 00:45, 2026-02-18 00:45, 2026-02-18 16:45, 2026-02-19 00:45, 2026-02-19 08:45, 2026-02-19 16:45, 2026-02-20 00:45, 2026-02-20 08:45, 2026-02-21 08:45, 2026-02-22 08:45, 2026-02-22 16:45, 2026-02-24 00:45, 2026-02-24 08:45, 2026-02-24 16:45, 2026-02-25 00:45, 2026-02-25 08:45, 2026-02-26 00:45, 2026-02-27 08:45, 2026-02-27 16:45, 2026-02-28 08:45, 2026-03-01 16:45, 2026-03-02 08:45, 2026-03-02 16:45, 2026-03-03 00:45, 2026-03-03 08:45, 2026-03-03 16:45, 2026-03-04 00:45, 2026-03-04 08:45, 2026-03-04 16:45, 2026-03-05 00:45, 2026-03-05 08:45, 2026-03-05 16:45, 2026-03-06 00:45, 2026-03-06 08:45, 2026-03-09 08:45, 2026-03-09 16:45, 2026-03-10 00:45, 2026-03-10 08:45
Echelon VNC login
175.214.22.90 is listed on the Echelon VNC login blacklist.

Description: VNC remote desktop login attempt on port 5900/5901
Type of feed: primary (feed detail page)

Last checked at: 2026-03-20 10:45:00.402000
Was present on blacklist at: 2026-03-05 10:45, 2026-03-06 10:45, 2026-03-09 10:45, 2026-03-10 10:45, 2026-03-11 10:45, 2026-03-12 10:45, 2026-03-14 10:45, 2026-03-16 10:45, 2026-03-17 10:45, 2026-03-18 10:45, 2026-03-19 10:45, 2026-03-20 10:45

Threat categories

TLRoleCategoryDetails
No threat category tags assigned

OTX pulses
[698dd39a9030587f24b3e194] 2026-02-12 13:20:23.765000 | VNC honeypot logs for 2026/02/12
Author name:jnazario
Pulse modified:2026-02-12 13:20:23.765000
Indicator created:2026-02-12 13:20:27
Indicator role:None
Indicator title:
Indicator expiration:2026-03-14 13:00:00
[69a58ea2b72d0927b17f56e1] 2026-03-02 13:20:34.077000 | VNC honeypot logs for 2026/03/02
Author name:jnazario
Pulse modified:2026-03-02 13:20:34.077000
Indicator created:2026-03-02 13:20:35
Indicator role:None
Indicator title:
Indicator expiration:2026-04-01 13:00:00
[69a8340fa1932fb5dbb859ee] 2026-03-04 13:30:55.779000 | VNC honeypot logs for 2026/03/04
Author name:jnazario
Pulse modified:2026-03-04 13:30:55.779000
Indicator created:2026-03-04 13:30:56
Indicator role:None
Indicator title:
Indicator expiration:2026-04-03 13:00:00
Origin AS
AS4766 - KIXS-AS-KR KIXS-AS-KR-KR
BGP Prefix
175.208.0.0/13
geo
South Korea, Yongin-si
🕑 Asia/Seoul
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
175.192.0.0 - 175.255.255.255
last_activity
2026-03-04 16:39:26.986000
reserved_range
0
Shodan's InternetDB
Open ports: 123
Tags:
CPEs: cpe:/a:ntp:ntp:4.2.0
ts_added
2026-02-11 23:10:04.333000
ts_last_update
2026-04-06 23:10:10.370000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses