IP address


.555200.32.52.150
Shodan(more info)
Passive DNS
Tags: Login attempts
IP blacklists
blocklist.de SSH
200.32.52.150 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-17 11:05:00.337000
Was present on blacklist at: 2025-11-28 11:05, 2025-11-28 17:05, 2025-11-28 23:05, 2025-11-29 05:05, 2025-11-29 11:05, 2025-11-29 17:05, 2025-11-29 23:05, 2025-11-30 05:05, 2025-11-30 11:05, 2025-11-30 17:05, 2025-11-30 23:05, 2025-12-01 17:05, 2025-12-02 05:05, 2025-12-02 11:05, 2025-12-02 17:05, 2025-12-03 05:05, 2025-12-03 11:05, 2025-12-03 23:05, 2025-12-04 05:05, 2025-12-04 11:05, 2025-12-04 17:05, 2025-12-05 17:05, 2025-12-06 05:05, 2025-12-06 11:05, 2025-12-06 17:05, 2025-12-06 23:05, 2025-12-07 11:05, 2025-12-07 17:05, 2025-12-07 23:05, 2025-12-08 05:05, 2025-12-08 11:05, 2025-12-08 17:05, 2025-12-08 23:05, 2025-12-09 05:05, 2025-12-09 11:05, 2025-12-09 17:05, 2025-12-10 05:05, 2025-12-10 23:05, 2025-12-11 05:05, 2025-12-11 11:05, 2025-12-11 17:05, 2025-12-11 23:05, 2025-12-12 05:05, 2025-12-12 11:05, 2025-12-13 11:05, 2025-12-13 17:05, 2025-12-13 23:05, 2025-12-14 05:05, 2025-12-14 11:05, 2025-12-15 05:05, 2025-12-15 11:05, 2025-12-16 05:05, 2025-12-16 11:05, 2025-12-16 23:05, 2025-12-17 11:05
Spamhaus XBL CBL
200.32.52.150 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-19 11:08:11.696000
Was present on blacklist at: 2025-11-28 11:08, 2025-12-05 11:08, 2025-12-12 11:08, 2025-12-19 11:08
DataPlane SSH login
200.32.52.150 is listed on the DataPlane SSH login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-20 19:10:01.429000
Was present on blacklist at: 2025-11-28 15:10, 2025-11-28 19:10, 2025-11-29 03:10, 2025-11-29 07:10, 2025-11-29 15:10, 2025-11-29 19:10, 2025-11-30 03:10, 2025-11-30 07:10, 2025-11-30 15:10, 2025-11-30 19:10, 2025-12-01 03:10, 2025-12-01 07:10, 2025-12-01 15:10, 2025-12-01 19:10, 2025-12-02 03:10, 2025-12-02 07:10, 2025-12-02 15:10, 2025-12-02 19:10, 2025-12-03 03:10, 2025-12-03 07:10, 2025-12-03 15:10, 2025-12-03 19:10, 2025-12-04 03:10, 2025-12-04 07:10, 2025-12-04 15:10, 2025-12-04 19:10, 2025-12-05 03:10, 2025-12-05 07:10, 2025-12-05 15:10, 2025-12-05 19:10, 2025-12-06 03:10, 2025-12-06 07:10, 2025-12-06 15:10, 2025-12-06 19:10, 2025-12-07 03:10, 2025-12-07 07:10, 2025-12-07 15:10, 2025-12-07 19:10, 2025-12-08 03:10, 2025-12-08 07:10, 2025-12-08 15:10, 2025-12-08 19:10, 2025-12-09 03:10, 2025-12-09 07:10, 2025-12-09 15:10, 2025-12-09 19:10, 2025-12-10 03:10, 2025-12-10 07:10, 2025-12-10 15:10, 2025-12-10 19:10, 2025-12-11 03:10, 2025-12-11 07:10, 2025-12-11 15:10, 2025-12-11 19:10, 2025-12-12 03:10, 2025-12-12 07:10, 2025-12-12 15:10, 2025-12-12 19:10, 2025-12-13 03:10, 2025-12-13 07:10, 2025-12-13 15:10, 2025-12-13 19:10, 2025-12-14 03:10, 2025-12-14 07:10, 2025-12-14 15:10, 2025-12-14 19:10, 2025-12-15 03:10, 2025-12-15 07:10, 2025-12-15 15:10, 2025-12-15 19:10, 2025-12-16 03:10, 2025-12-16 07:10, 2025-12-16 15:10, 2025-12-16 19:10, 2025-12-17 03:10, 2025-12-17 07:10, 2025-12-17 15:10, 2025-12-17 19:10, 2025-12-18 03:10, 2025-12-18 07:10, 2025-12-18 15:10, 2025-12-18 19:10, 2025-12-19 03:10, 2025-12-19 07:10, 2025-12-19 15:10, 2025-12-19 19:10, 2025-12-20 03:10, 2025-12-20 07:10, 2025-12-20 15:10, 2025-12-20 19:10
AbuseIPDB
200.32.52.150 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-12-20 05:00:00.692000
Was present on blacklist at: 2025-11-29 05:00, 2025-12-02 05:00, 2025-12-03 05:00, 2025-12-04 05:00, 2025-12-05 05:00, 2025-12-06 05:00, 2025-12-07 05:00, 2025-12-08 05:00, 2025-12-09 05:00, 2025-12-10 05:00, 2025-12-11 05:00, 2025-12-12 05:00, 2025-12-13 05:00, 2025-12-14 05:00, 2025-12-15 05:00, 2025-12-16 05:00, 2025-12-17 05:00, 2025-12-18 05:00, 2025-12-19 05:00, 2025-12-20 05:00
UCEPROTECT L1
200.32.52.150 is listed on the UCEPROTECT L1 blacklist.

Description: UCEPROTECT-NETWORK list of spam IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-20 16:45:00.480000
Was present on blacklist at: 2025-12-01 16:45, 2025-12-02 00:45, 2025-12-02 08:45, 2025-12-02 16:45, 2025-12-03 00:45, 2025-12-03 08:45, 2025-12-03 16:45, 2025-12-04 00:45, 2025-12-04 08:45, 2025-12-04 16:45, 2025-12-05 00:45, 2025-12-05 08:45, 2025-12-05 16:45, 2025-12-06 00:45, 2025-12-06 08:45, 2025-12-06 16:45, 2025-12-07 00:45, 2025-12-07 08:45, 2025-12-07 16:45, 2025-12-08 00:45, 2025-12-08 08:45, 2025-12-08 16:45, 2025-12-09 00:45, 2025-12-09 08:45, 2025-12-09 16:45, 2025-12-10 00:45, 2025-12-10 08:45, 2025-12-10 16:45, 2025-12-11 00:45, 2025-12-11 08:45, 2025-12-11 16:45, 2025-12-12 00:45, 2025-12-12 08:45, 2025-12-12 16:45, 2025-12-13 00:45, 2025-12-13 08:45, 2025-12-13 16:45, 2025-12-14 00:45, 2025-12-14 08:45, 2025-12-14 16:45, 2025-12-15 00:45, 2025-12-15 08:45, 2025-12-15 16:45, 2025-12-16 00:45, 2025-12-16 08:45, 2025-12-16 16:45, 2025-12-17 00:45, 2025-12-17 08:45, 2025-12-17 16:45, 2025-12-18 00:45, 2025-12-18 08:45, 2025-12-18 16:45, 2025-12-19 00:45, 2025-12-19 08:45, 2025-12-19 16:45, 2025-12-20 00:45, 2025-12-20 08:45, 2025-12-20 16:45
blocklist.de web-login
200.32.52.150 is listed on the blocklist.de web-login blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-19 23:05:00.372000
Was present on blacklist at: 2025-12-01 23:05, 2025-12-03 17:05, 2025-12-04 23:05, 2025-12-05 05:05, 2025-12-05 11:05, 2025-12-05 17:05, 2025-12-05 23:05, 2025-12-08 23:05, 2025-12-09 23:05, 2025-12-10 11:05, 2025-12-10 17:05, 2025-12-12 17:05, 2025-12-12 23:05, 2025-12-13 05:05, 2025-12-14 17:05, 2025-12-14 23:05, 2025-12-15 17:05, 2025-12-15 23:05, 2025-12-16 17:05, 2025-12-17 05:05, 2025-12-17 17:05, 2025-12-17 23:05, 2025-12-18 05:05, 2025-12-18 11:05, 2025-12-18 17:05, 2025-12-18 23:05, 2025-12-19 05:05, 2025-12-19 11:05, 2025-12-19 17:05, 2025-12-19 23:05
blocklist.de Apache
200.32.52.150 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-19 23:05:05.226000
Was present on blacklist at: 2025-12-01 23:05, 2025-12-02 23:05, 2025-12-03 05:05, 2025-12-03 17:05, 2025-12-04 23:05, 2025-12-05 05:05, 2025-12-05 11:05, 2025-12-05 23:05, 2025-12-08 23:05, 2025-12-09 23:05, 2025-12-10 11:05, 2025-12-10 17:05, 2025-12-12 17:05, 2025-12-12 23:05, 2025-12-13 05:05, 2025-12-14 17:05, 2025-12-14 23:05, 2025-12-15 17:05, 2025-12-15 23:05, 2025-12-16 17:05, 2025-12-17 05:05, 2025-12-17 17:05, 2025-12-17 23:05, 2025-12-18 05:05, 2025-12-18 11:05, 2025-12-18 17:05, 2025-12-18 23:05, 2025-12-19 05:05, 2025-12-19 11:05, 2025-12-19 17:05, 2025-12-19 23:05
Turris greylist
200.32.52.150 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-18 22:15:00.167000
Was present on blacklist at: 2025-12-02 22:15, 2025-12-03 22:15, 2025-12-04 22:15, 2025-12-05 22:15, 2025-12-06 22:15, 2025-12-08 22:15, 2025-12-09 22:15, 2025-12-11 22:15, 2025-12-12 22:15, 2025-12-14 22:15, 2025-12-15 22:15, 2025-12-16 22:15, 2025-12-17 22:15, 2025-12-18 22:15
BruteForceBlocker
200.32.52.150 is listed on the BruteForceBlocker blacklist.

Description: Daniel Gerzo's BruteForceBlocker. The list is made by perl script,<br>that works along with pf - OpenBSD's firewall and it's main<br>purpose is to block SSH bruteforce attacks via firewall.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-20 03:52:00.258000
Was present on blacklist at: 2025-12-10 03:52, 2025-12-11 03:52, 2025-12-12 03:52, 2025-12-13 03:52, 2025-12-14 03:52, 2025-12-15 03:52, 2025-12-16 03:52, 2025-12-17 03:52, 2025-12-18 03:52, 2025-12-19 03:52, 2025-12-20 03:52
FireHOL anonymizers
200.32.52.150 is listed on the FireHOL anonymizers blacklist.

Description: List of anonymizing IPs, aggregated from multiple lists by FireHOL.
Type of feed: secondary (feed detail page)

Last checked at: 2025-12-20 12:05:09
Was present on blacklist at: 2025-12-12 12:05, 2025-12-13 12:05, 2025-12-14 12:05, 2025-12-15 12:05, 2025-12-16 12:05, 2025-12-17 12:05, 2025-12-18 12:05, 2025-12-19 12:05, 2025-12-20 12:05
blocklist.de strong IPs
200.32.52.150 is listed on the blocklist.de strong IPs blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that are older then two month and have<br>more then 5.000 attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-20 17:05:00.596000
Was present on blacklist at: 2025-12-14 17:05, 2025-12-14 23:05, 2025-12-15 05:05, 2025-12-15 11:05, 2025-12-15 17:05, 2025-12-15 23:05, 2025-12-16 05:05, 2025-12-16 11:05, 2025-12-16 17:05, 2025-12-16 23:05, 2025-12-17 05:05, 2025-12-17 11:05, 2025-12-17 17:05, 2025-12-17 23:05, 2025-12-18 05:05, 2025-12-18 11:05, 2025-12-18 17:05, 2025-12-18 23:05, 2025-12-19 05:05, 2025-12-19 11:05, 2025-12-19 17:05, 2025-12-19 23:05, 2025-12-20 05:05, 2025-12-20 11:05, 2025-12-20 17:05
Warden events (226)
2025-12-17
AttemptLogin (node.985fb4): 5
AttemptLogin (node.d2ecc6): 2
AttemptLogin (node.ee25b8): 3
AttemptLogin (node.b17ef8): 3
AttemptLogin (node.28c168): 3
AttemptLogin (node.00aee5): 1
IntrusionUserCompromise (node.40929a): 4
2025-12-16
AttemptLogin (node.985fb4): 6
AttemptLogin (node.d2ecc6): 6
IntrusionUserCompromise (node.40929a): 3
AttemptLogin (node.40929a): 1
2025-12-15
AttemptLogin (node.985fb4): 6
AttemptLogin (node.d2ecc6): 6
IntrusionUserCompromise (node.40929a): 2
AttemptLogin (node.40929a): 1
2025-12-14
AttemptLogin (node.985fb4): 7
AttemptLogin (node.d2ecc6): 6
IntrusionUserCompromise (node.40929a): 3
AttemptLogin (node.40929a): 1
2025-12-13
AttemptLogin (node.985fb4): 7
AttemptLogin (node.d2ecc6): 6
IntrusionUserCompromise (node.40929a): 3
AttemptLogin (node.40929a): 1
2025-12-12
AttemptLogin (node.985fb4): 7
AttemptLogin (node.d2ecc6): 4
AttemptLogin (node.40929a): 1
IntrusionUserCompromise (node.40929a): 3
2025-12-11
AttemptLogin (node.985fb4): 6
AttemptLogin (node.d2ecc6): 6
AttemptLogin (node.40929a): 1
IntrusionUserCompromise (node.40929a): 3
2025-12-10
AttemptLogin (node.985fb4): 8
AttemptLogin (node.d2ecc6): 3
IntrusionUserCompromise (node.40929a): 3
AttemptLogin (node.40929a): 1
2025-12-09
AttemptLogin (node.985fb4): 8
IntrusionUserCompromise (node.40929a): 2
AttemptLogin (node.40929a): 1
2025-12-08
AttemptLogin (node.985fb4): 9
AttemptLogin (node.40929a): 1
IntrusionUserCompromise (node.40929a): 1
2025-12-07
AttemptLogin (node.985fb4): 9
AttemptLogin (node.40929a): 1
IntrusionUserCompromise (node.40929a): 1
2025-12-06
AttemptLogin (node.985fb4): 9
AttemptLogin (node.40929a): 1
IntrusionUserCompromise (node.40929a): 1
2025-12-05
AttemptLogin (node.985fb4): 8
AttemptLogin (node.40929a): 1
IntrusionUserCompromise (node.40929a): 3
2025-12-04
AttemptLogin (node.985fb4): 9
IntrusionUserCompromise (node.40929a): 4
AttemptLogin (node.40929a): 1
2025-12-03
AttemptLogin (node.985fb4): 9
IntrusionUserCompromise (node.40929a): 3
AttemptLogin (node.40929a): 1
2025-12-02
AttemptLogin (node.985fb4): 4
AttemptLogin (node.40929a): 1
IntrusionUserCompromise (node.40929a): 3
2025-12-01
IntrusionUserCompromise (node.40929a): 2
AttemptLogin (node.40929a): 1
DShield reports (IP summary, reports)
2025-12-01
Number of reports: 59
Distinct targets: 4
2025-12-02
Number of reports: 59
Distinct targets: 4
2025-12-03
Number of reports: 110
Distinct targets: 4
2025-12-04
Number of reports: 85
Distinct targets: 4
2025-12-05
Number of reports: 54
Distinct targets: 3
2025-12-06
Number of reports: 39
Distinct targets: 3
2025-12-07
Number of reports: 39
Distinct targets: 3
2025-12-08
Number of reports: 76
Distinct targets: 4
2025-12-09
Number of reports: 74
Distinct targets: 4
2025-12-10
Number of reports: 137
Distinct targets: 7
2025-12-11
Number of reports: 98
Distinct targets: 5
2025-12-12
Number of reports: 98
Distinct targets: 5
2025-12-13
Number of reports: 101
Distinct targets: 6
2025-12-14
Number of reports: 92
Distinct targets: 6
2025-12-15
Number of reports: 74
Distinct targets: 6
2025-12-16
Number of reports: 46
Distinct targets: 6
2025-12-17
Number of reports: 97
Distinct targets: 13
2025-12-18
Number of reports: 97
Distinct targets: 13
Origin AS
AS10834 -
BGP Prefix
200.32.52.0/24
geo
Argentina, Buenos Aires
🕑 America/Argentina/Buenos_Aires
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
200.32.32.0 - 200.32.63.255
last_activity
2025-12-17 22:30:46.105000
last_warden_event
2025-12-17 22:30:46.105000
rep
0.5551053092593238
reserved_range
0
Shodan's InternetDB
Open ports: 80, 122, 443, 10000
Tags: self-signed
CPEs: cpe:/o:canonical:ubuntu_linux, cpe:/a:apache:http_server:2.4.46, cpe:/a:webmin:webmin, cpe:/a:openbsd:openssh:7.2p2, cpe:/a:perl:perl
ts_added
2025-11-28 11:08:03.153000
ts_last_update
2025-12-20 19:14:57.292000

Warden event timeline

DShield event timeline

Presence on blacklists