IP address


.214211.105.129.57
Shodan(more info)
Passive DNS
Tags: Login attempts
IP blacklists
blocklist.de SSH
211.105.129.57 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-07 10:05:00.433000
Was present on blacklist at: 2026-03-25 23:05, 2026-03-26 05:05, 2026-03-26 11:05, 2026-03-26 17:05, 2026-03-27 11:05, 2026-03-27 17:05, 2026-03-27 23:05, 2026-03-28 05:05, 2026-03-28 11:05, 2026-03-28 17:05, 2026-03-29 04:05, 2026-03-29 22:05, 2026-03-30 04:05, 2026-03-30 10:05, 2026-03-30 16:05, 2026-03-30 22:05, 2026-03-31 04:05, 2026-03-31 10:05, 2026-03-31 16:05, 2026-03-31 22:05, 2026-04-01 04:05, 2026-04-01 10:05, 2026-04-01 16:05, 2026-04-01 22:05, 2026-04-02 04:05, 2026-04-02 10:05, 2026-04-02 16:05, 2026-04-02 22:05, 2026-04-03 04:05, 2026-04-03 10:05, 2026-04-03 22:05, 2026-04-04 04:05, 2026-04-04 10:05, 2026-04-04 16:05, 2026-04-04 22:05, 2026-04-05 04:05, 2026-04-05 10:05, 2026-04-05 16:05, 2026-04-05 22:05, 2026-04-06 04:05, 2026-04-06 10:05, 2026-04-06 16:05, 2026-04-06 22:05, 2026-04-07 04:05, 2026-04-07 10:05
Spamhaus XBL CBL
211.105.129.57 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-04-01 23:09:41.820000
Was present on blacklist at: 2026-03-25 23:09
AbuseIPDB
211.105.129.57 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-04-07 04:00:00.628000
Was present on blacklist at: 2026-03-26 05:00, 2026-03-27 05:00, 2026-03-29 04:00, 2026-03-30 04:00, 2026-03-31 04:00, 2026-04-01 04:00, 2026-04-02 04:00, 2026-04-03 04:00, 2026-04-06 04:00, 2026-04-07 04:00
blocklist.de web-login
211.105.129.57 is listed on the blocklist.de web-login blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-28 23:05:05.169000
Was present on blacklist at: 2026-03-26 23:05, 2026-03-27 05:05, 2026-03-28 23:05
blocklist.de Apache
211.105.129.57 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-28 23:05:05.440000
Was present on blacklist at: 2026-03-26 23:05, 2026-03-27 05:05, 2026-03-28 23:05
blocklist.de SIP
211.105.129.57 is listed on the blocklist.de SIP blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IP addresses that tried to login in a SIP,<br>VOIP or Asterisk Server.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-29 10:05:05.046000
Was present on blacklist at: 2026-03-29 10:05
blocklist.de FTP
211.105.129.57 is listed on the blocklist.de FTP blacklist.

Description: Blocklist.de feed is a free and voluntary service<br>provided by a Fraud/Abuse-specialist. IPs performing attacks<br>on the Service FTP.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-29 16:05:00.116000
Was present on blacklist at: 2026-03-29 16:05
UCEPROTECT L1
211.105.129.57 is listed on the UCEPROTECT L1 blacklist.

Description: UCEPROTECT-NETWORK list of spam IPs.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-07 07:45:01.332000
Was present on blacklist at: 2026-04-06 07:45, 2026-04-06 15:45, 2026-04-06 23:45, 2026-04-07 07:45

Threat categories

TLRoleCategoryDetails
55 src login protocol: ssh
50 src scan
33 src

Warden events (75)
2026-04-06
AttemptLogin (node.03e7a9): 9
2026-04-05
AttemptLogin (node.03e7a9): 13
2026-03-30
AttemptLogin (node.c26a5f): 13
2026-03-28
AttemptLogin (node.c26a5f): 16
2026-03-27
AttemptLogin (node.03e7a9): 20
AttemptLogin (node.c26a5f): 4
DShield reports (IP summary, reports)
2026-03-25
Number of reports: 117
Distinct targets: 7
2026-03-26
Number of reports: 117
Distinct targets: 7
2026-03-27
Number of reports: 249
Distinct targets: 10
2026-03-28
Number of reports: 452
Distinct targets: 15
2026-03-29
Number of reports: 452
Distinct targets: 15
2026-03-30
Number of reports: 352
Distinct targets: 14
2026-03-31
Number of reports: 352
Distinct targets: 14
2026-04-01
Number of reports: 306
Distinct targets: 12
2026-04-02
Number of reports: 306
Distinct targets: 16
2026-04-03
Number of reports: 123
Distinct targets: 7
2026-04-04
Number of reports: 387
Distinct targets: 10
2026-04-05
Number of reports: 227
Distinct targets: 8
2026-04-06
Number of reports: 242
Distinct targets: 10
Origin AS
AS4766 - KIXS-AS-KR KIXS-AS-KR-KR
BGP Prefix
211.104.0.0/14
geo
South Korea, Buk-gu
🕑 Asia/Seoul
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
211.104.0.0 - 211.107.255.255
last_activity
2026-04-06 19:40:05.073000
last_warden_event
2026-04-06 19:40:05.073000
rep
0.21414351690383185
reserved_range
0
Shodan's InternetDB
Open ports: 21, 5000
Tags:
CPEs: cpe:/a:synology:diskstation_manager:7.2.2-72806, cpe:/a:f5:nginx
ts_added
2026-03-25 23:09:35.708000
ts_last_update
2026-04-07 10:09:07.667000

Warden event timeline

DShield event timeline

Presence on blacklists