IP address


.667176.65.139.16
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
Spamhaus SBL
176.65.139.16 is listed on the Spamhaus SBL blacklist.

Description: The Spamhaus Block List ("SBL") Advisory is a database of IP addresses from which Spamhaus does not recommend the acceptance of electronic mail.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-02-07 02:22:30.096000
Was present on blacklist at: 2026-01-31 02:22, 2026-02-07 02:22
Spamhaus DROP
176.65.139.16 is listed on the Spamhaus DROP blacklist.

Description: Spamhaus DROP (Don't Route Or Peer) list. Netblocks controlled by spammers or cyber criminals. The DROP lists are a tiny subset of the SBL, designed for use by firewalls and routing equipment to filter out the malicious traffic from these netblocks.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-02-07 02:22:30.096000
Was present on blacklist at: 2026-01-31 02:22, 2026-02-07 02:22
DataPlane TELNET login
176.65.139.16 is listed on the DataPlane TELNET login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login via TELNET password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-07 15:10:02.392000
Was present on blacklist at: 2026-01-31 19:10, 2026-01-31 23:10, 2026-02-01 03:10, 2026-02-01 07:10, 2026-02-01 11:10, 2026-02-01 15:10, 2026-02-01 19:10, 2026-02-01 23:10, 2026-02-02 03:10, 2026-02-02 07:10, 2026-02-02 11:10, 2026-02-02 15:11, 2026-02-02 19:10, 2026-02-02 23:10, 2026-02-03 03:10, 2026-02-03 07:10, 2026-02-03 11:10, 2026-02-03 15:10, 2026-02-03 19:10, 2026-02-03 23:10, 2026-02-04 03:10, 2026-02-04 07:10, 2026-02-04 11:10, 2026-02-04 15:10, 2026-02-04 19:10, 2026-02-04 23:10, 2026-02-05 03:10, 2026-02-05 07:10, 2026-02-05 11:10, 2026-02-05 15:10, 2026-02-05 19:10, 2026-02-05 23:10, 2026-02-06 03:10, 2026-02-06 07:10, 2026-02-06 11:10, 2026-02-06 15:10, 2026-02-06 19:10, 2026-02-06 23:10, 2026-02-07 03:10, 2026-02-07 07:10, 2026-02-07 11:10, 2026-02-07 15:10
DShield Block
176.65.139.16 is listed on the DShield Block blacklist.

Description: Recommended Block List by DShield.org. It summarizes the top 20 attacking<br>class C (/24) subnets over the last three days.
Type of feed: secondary (feed detail page)

Last checked at: 2026-02-10 04:50:00
Was present on blacklist at: 2026-01-31 04:50, 2026-02-01 04:50, 2026-02-02 04:50, 2026-02-03 04:50, 2026-02-04 04:50, 2026-02-06 04:50, 2026-02-09 04:50, 2026-02-10 04:50
AbuseIPDB
176.65.139.16 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-02-10 05:00:00.598000
Was present on blacklist at: 2026-02-01 05:00, 2026-02-02 05:00, 2026-02-03 05:00, 2026-02-04 05:00, 2026-02-05 05:00, 2026-02-06 05:00, 2026-02-07 05:00, 2026-02-08 05:00, 2026-02-10 05:00
Turris greylist
176.65.139.16 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-10 22:15:00.134000
Was present on blacklist at: 2026-02-01 22:15, 2026-02-02 22:15, 2026-02-03 22:15, 2026-02-04 22:15, 2026-02-05 22:15, 2026-02-06 22:15, 2026-02-07 22:15, 2026-02-08 22:15, 2026-02-09 22:15, 2026-02-10 22:15

Threat categories

TLRoleCategoryDetails
50 src login protocol: telnet

Warden events (3110)
2026-02-10
ReconScanning (node.368407): 146
ReconScanning (node.4dc198): 150
ReconScanning (node.9c1411): 42
2026-02-09
ReconScanning (node.9c1411): 60
ReconScanning (node.4dc198): 178
IntrusionUserCompromise (node.cfb4f7): 62
ReconScanning (node.368407): 31
2026-02-08
ReconScanning (node.4dc198): 240
ReconScanning (node.9c1411): 64
2026-02-07
ReconScanning (node.4dc198): 51
ReconScanning (node.9c1411): 11
2026-02-06
ReconScanning (node.4dc198): 115
ReconScanning (node.9c1411): 41
2026-02-05
ReconScanning (node.4dc198): 280
ReconScanning (node.9c1411): 69
2026-02-04
ReconScanning (node.4dc198): 271
ReconScanning (node.9c1411): 70
2026-02-03
ReconScanning (node.4dc198): 286
ReconScanning (node.9c1411): 68
2026-02-02
ReconScanning (node.4dc198): 220
IntrusionUserCompromise (node.cfb4f7): 74
ReconScanning (node.9c1411): 32
2026-02-01
ReconScanning (node.4dc198): 51
2026-01-31
ReconScanning (node.4dc198): 236
ReconScanning (node.368407): 134
AnomalyTraffic (node.ffe95c): 4
IntrusionUserCompromise (node.cfb4f7): 124
OTX pulses
[602bc528f447d628d41494f2] 2021-02-16 13:14:16.945000 | Ka's Honeypot visitors
Author name:Kapppppa
Pulse modified:2026-02-10 23:59:27.280000
Indicator created:2026-02-10 16:05:01
Indicator role:bruteforce
Indicator title:Telnet Login attempt
Indicator expiration:2026-03-12 16:00:00
Origin AS
AS51396 - PFCLOUD
BGP Prefix
176.65.139.0/24
geo
Germany
🕑 Europe/Berlin
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
176.65.128.0 - 176.65.159.255
last_activity
2026-02-11 00:43:53.310000
last_warden_event
2026-02-10 16:50:29
rep
0.6672619047619046
reserved_range
0
ts_added
2026-01-31 02:22:25.771000
ts_last_update
2026-02-11 02:22:30.246000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses