IP address


.241192.109.200.192saltyknot.ptr.network
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
CI Army
192.109.200.192 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2026-01-30 03:50:00.947000
Was present on blacklist at: 2026-01-24 03:50, 2026-01-25 03:50, 2026-01-26 03:50, 2026-01-27 03:50, 2026-01-28 03:50, 2026-01-29 03:50, 2026-01-30 03:50
Turris greylist
192.109.200.192 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-07 22:15:00.148000
Was present on blacklist at: 2026-01-24 22:15, 2026-02-02 22:15, 2026-02-04 22:15, 2026-02-06 22:15, 2026-02-07 22:15
AbuseIPDB
192.109.200.192 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-02-03 05:00:00.625000
Was present on blacklist at: 2026-01-26 05:00, 2026-02-03 05:00
Spamhaus SBL
192.109.200.192 is listed on the Spamhaus SBL blacklist.

Description: The Spamhaus Block List ("SBL") Advisory is a database of IP addresses from which Spamhaus does not recommend the acceptance of electronic mail.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-02-06 22:50:00.483000
Was present on blacklist at: 2026-01-30 22:50, 2026-02-06 22:50
Spamhaus DROP
192.109.200.192 is listed on the Spamhaus DROP blacklist.

Description: Spamhaus DROP (Don't Route Or Peer) list. Netblocks controlled by spammers or cyber criminals. The DROP lists are a tiny subset of the SBL, designed for use by firewalls and routing equipment to filter out the malicious traffic from these netblocks.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-02-06 22:50:00.483000
Was present on blacklist at: 2026-01-30 22:50, 2026-02-06 22:50
DataPlane TELNET login
192.109.200.192 is listed on the DataPlane TELNET login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login via TELNET password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-10 23:10:01.782000
Was present on blacklist at: 2026-02-05 11:10, 2026-02-05 15:10, 2026-02-05 19:10, 2026-02-05 23:10, 2026-02-06 03:10, 2026-02-06 07:10, 2026-02-06 11:10, 2026-02-06 15:10, 2026-02-06 19:10, 2026-02-06 23:10, 2026-02-07 03:10, 2026-02-07 07:10, 2026-02-07 11:10, 2026-02-07 15:10, 2026-02-07 19:10, 2026-02-07 23:10, 2026-02-08 03:10, 2026-02-08 07:10, 2026-02-08 11:10, 2026-02-08 15:10, 2026-02-08 19:10, 2026-02-08 23:10, 2026-02-09 03:10, 2026-02-09 07:10, 2026-02-09 11:10, 2026-02-09 15:10, 2026-02-09 19:10, 2026-02-09 23:10, 2026-02-10 03:10, 2026-02-10 07:10, 2026-02-10 15:10, 2026-02-10 19:10, 2026-02-10 23:10
Spamhaus XBL CBL
192.109.200.192 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-02-06 22:50:00.483000
Was present on blacklist at: 2026-02-06 22:50

Threat categories

TLRoleCategoryDetails
37 src login protocol: telnet

Warden events (994)
2026-02-05
ReconScanning (node.368407): 110
ReconScanning (node.4dc198): 113
ReconScanning (node.9c1411): 35
IntrusionUserCompromise (node.cfb4f7): 312
2026-02-04
ReconScanning (node.4dc198): 8
ReconScanning (node.368407): 7
ReconScanning (node.9c1411): 4
2026-02-03
ReconScanning (node.4dc198): 21
ReconScanning (node.368407): 17
ReconScanning (node.9c1411): 6
2026-02-01
ReconScanning (node.4dc198): 28
ReconScanning (node.368407): 25
2026-01-26
ReconScanning (node.4dc198): 19
ReconScanning (node.368407): 18
2026-01-25
ReconScanning (node.4dc198): 91
ReconScanning (node.368407): 90
2026-01-23
IntrusionUserCompromise (node.cfb4f7): 90
DShield reports (IP summary, reports)
2026-01-23
Number of reports: 15
Distinct targets: 9
2026-01-24
Number of reports: 15
Distinct targets: 9
2026-01-25
Number of reports: 691
Distinct targets: 431
2026-01-26
Number of reports: 691
Distinct targets: 431
OTX pulses
[602bc528f447d628d41494f2] 2021-02-16 13:14:16.945000 | Ka's Honeypot visitors
Author name:Kapppppa
Pulse modified:2026-02-10 23:59:27.280000
Indicator created:2026-02-05 08:30:43
Indicator role:bruteforce
Indicator title:Telnet Login attempt
Indicator expiration:2026-03-07 08:00:00
[698499876d5916a5fe836ac7] 2026-02-05 13:22:15.270000 | Telnet honeypot logs for 2026-02-05
Author name:jnazario
Pulse modified:2026-02-05 13:22:15.270000
Indicator created:2026-02-05 13:22:16
Indicator role:None
Indicator title:
Indicator expiration:2026-03-07 13:00:00
Origin AS
AS51396 - PFCLOUD
BGP Prefix
192.109.200.0/24
geo
Sweden, Stockholm
🕑 Europe/Stockholm
hostname
saltyknot.ptr.network
Address block ('inetnum' or 'NetRange' in whois database)
192.109.200.0 - 192.109.201.255
last_activity
2026-02-11 00:43:43.917000
last_warden_event
2026-02-05 23:26:50
rep
0.24107130141485306
reserved_range
0
ts_added
2026-01-23 22:49:53.903000
ts_last_update
2026-02-11 00:43:43.929000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses