IP address


.704176.65.139.20
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
Spamhaus SBL
176.65.139.20 is listed on the Spamhaus SBL blacklist.

Description: The Spamhaus Block List ("SBL") Advisory is a database of IP addresses from which Spamhaus does not recommend the acceptance of electronic mail.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-02-08 09:52:00.111000
Was present on blacklist at: 2026-02-01 09:51, 2026-02-08 09:52
Spamhaus DROP
176.65.139.20 is listed on the Spamhaus DROP blacklist.

Description: Spamhaus DROP (Don't Route Or Peer) list. Netblocks controlled by spammers or cyber criminals. The DROP lists are a tiny subset of the SBL, designed for use by firewalls and routing equipment to filter out the malicious traffic from these netblocks.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-02-08 09:52:00.111000
Was present on blacklist at: 2026-02-01 09:51, 2026-02-08 09:52
DShield Block
176.65.139.20 is listed on the DShield Block blacklist.

Description: Recommended Block List by DShield.org. It summarizes the top 20 attacking<br>class C (/24) subnets over the last three days.
Type of feed: secondary (feed detail page)

Last checked at: 2026-02-10 04:50:00
Was present on blacklist at: 2026-02-01 04:50, 2026-02-02 04:50, 2026-02-03 04:50, 2026-02-04 04:50, 2026-02-06 04:50, 2026-02-09 04:50, 2026-02-10 04:50
AbuseIPDB
176.65.139.20 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-02-09 05:00:00.655000
Was present on blacklist at: 2026-02-03 05:00, 2026-02-04 05:00, 2026-02-05 05:00, 2026-02-07 05:00, 2026-02-09 05:00
Turris greylist
176.65.139.20 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-10 22:15:00.134000
Was present on blacklist at: 2026-02-03 22:15, 2026-02-04 22:15, 2026-02-05 22:15, 2026-02-06 22:15, 2026-02-10 22:15
UCEPROTECT L1
176.65.139.20 is listed on the UCEPROTECT L1 blacklist.

Description: UCEPROTECT-NETWORK list of spam IPs.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-10 16:45:00.426000
Was present on blacklist at: 2026-02-05 00:45, 2026-02-06 08:45, 2026-02-07 16:45, 2026-02-08 08:45, 2026-02-08 16:45, 2026-02-10 00:45, 2026-02-10 08:45, 2026-02-10 16:45
DataPlane SSH conn
176.65.139.20 is listed on the DataPlane SSH conn blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IP addresses that<br>has been seen initiating an unsolicited SSH connection to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-10 23:10:06.312000
Was present on blacklist at: 2026-02-05 11:10, 2026-02-05 15:10, 2026-02-05 19:10, 2026-02-05 23:10, 2026-02-06 03:10, 2026-02-06 07:10, 2026-02-06 11:10, 2026-02-06 15:10, 2026-02-06 19:10, 2026-02-06 23:10, 2026-02-07 03:10, 2026-02-07 07:10, 2026-02-07 11:10, 2026-02-07 15:10, 2026-02-07 19:10, 2026-02-07 23:10, 2026-02-08 03:10, 2026-02-08 07:10, 2026-02-08 11:10, 2026-02-08 15:10, 2026-02-08 19:10, 2026-02-08 23:10, 2026-02-09 03:10, 2026-02-09 07:10, 2026-02-09 11:10, 2026-02-09 15:10, 2026-02-09 19:10, 2026-02-09 23:10, 2026-02-10 03:10, 2026-02-10 07:10, 2026-02-10 11:10, 2026-02-10 15:10, 2026-02-10 19:10, 2026-02-10 23:10
DataPlane SSH login
176.65.139.20 is listed on the DataPlane SSH login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-10 07:10:02.486000
Was present on blacklist at: 2026-02-05 15:10, 2026-02-05 19:10, 2026-02-06 03:10, 2026-02-06 07:10, 2026-02-06 15:10, 2026-02-07 03:10, 2026-02-07 07:10, 2026-02-07 15:10, 2026-02-07 19:10, 2026-02-08 03:10, 2026-02-08 07:10, 2026-02-08 15:10, 2026-02-08 19:10, 2026-02-09 03:10, 2026-02-09 07:10, 2026-02-09 15:10, 2026-02-09 19:10, 2026-02-10 03:10, 2026-02-10 07:10
Spamhaus XBL CBL
176.65.139.20 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-02-08 09:52:00.111000
Was present on blacklist at: 2026-02-08 09:52

Threat categories

TLRoleCategoryDetails
50 src scan port: 23
44 src login protocol: ssh, telnet
port: 22

Warden events (666)
2026-02-11
ReconScanning (node.4dc198): 6
ReconScanning (node.368407): 6
ReconScanning (node.9c1411): 3
IntrusionUserCompromise (node.03e7a9): 2
IntrusionUserCompromise (node.28c168): 3
IntrusionUserCompromise (node.00aee5): 4
AttemptLogin (node.03e7a9): 2
AttemptLogin (node.00aee5): 1
AttemptLogin (node.28c168): 1
2026-02-10
ReconScanning (node.4dc198): 17
ReconScanning (node.368407): 18
ReconScanning (node.9c1411): 5
2026-02-09
IntrusionUserCompromise (node.00aee5): 4
IntrusionUserCompromise (node.28c168): 3
AttemptLogin (node.00aee5): 1
AttemptLogin (node.28c168): 1
ReconScanning (node.4dc198): 67
ReconScanning (node.368407): 66
ReconScanning (node.9c1411): 5
AnomalyTraffic (node.ffe95c): 7
IntrusionUserCompromise (node.40929a): 1
AttemptLogin (node.40929a): 1
2026-02-07
ReconScanning (node.4dc198): 24
ReconScanning (node.368407): 23
AnomalyTraffic (node.ffe95c): 1
ReconScanning (node.9c1411): 4
2026-02-05
ReconScanning (node.368407): 36
ReconScanning (node.4dc198): 39
ReconScanning (node.9c1411): 10
AnomalyTraffic (node.ffe95c): 1
AttemptLogin (node.b17ef8): 1
IntrusionUserCompromise (node.b17ef8): 1
IntrusionUserCompromise (node.00aee5): 4
AttemptLogin (node.00aee5): 1
IntrusionUserCompromise (node.40929a): 5
AttemptLogin (node.40929a): 1
2026-02-04
ReconScanning (node.4dc198): 48
ReconScanning (node.368407): 47
ReconScanning (node.9c1411): 43
2026-02-03
ReconScanning (node.4dc198): 17
ReconScanning (node.368407): 10
ReconScanning (node.9c1411): 5
AnomalyTraffic (node.ffe95c): 6
2026-02-02
ReconScanning (node.368407): 54
ReconScanning (node.4dc198): 53
ReconScanning (node.9c1411): 3
2026-02-01
AnomalyTraffic (node.ffe95c): 2
ReconScanning (node.4dc198): 2
ReconScanning (node.368407): 1
OTX pulses
[602bc528f447d628d41494f2] 2021-02-16 13:14:16.945000 | Ka's Honeypot visitors
Author name:Kapppppa
Pulse modified:2026-02-10 23:59:27.280000
Indicator created:2026-02-09 10:27:59
Indicator role:bruteforce
Indicator title:Telnet Login attempt
Indicator expiration:2026-03-11 10:00:00
Origin AS
AS51396 - PFCLOUD
BGP Prefix
176.65.139.0/24
geo
Germany
🕑 Europe/Berlin
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
176.65.128.0 - 176.65.159.255
last_activity
2026-02-11 01:58:16.978000
last_warden_event
2026-02-11 01:58:16.978000
rep
0.7037202380952381
reserved_range
0
ts_added
2026-02-01 09:51:54.881000
ts_last_update
2026-02-11 01:58:41.667000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses