IP address


.195213.209.143.26
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
Spamhaus SBL
213.209.143.26 was recently listed on the Spamhaus SBL blacklist, but currently it is not.

Description: The Spamhaus Block List ("SBL") Advisory is a database of IP addresses from which Spamhaus does not recommend the acceptance of electronic mail.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-20 13:16:20.064000
Was present on blacklist at: 2025-12-06 13:16, 2025-12-13 13:16
Spamhaus DROP
213.209.143.26 was recently listed on the Spamhaus DROP blacklist, but currently it is not.

Description: Spamhaus DROP (Don't Route Or Peer) list. Netblocks controlled by spammers or cyber criminals. The DROP lists are a tiny subset of the SBL, designed for use by firewalls and routing equipment to filter out the malicious traffic from these netblocks.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-20 13:16:20.064000
Was present on blacklist at: 2025-12-06 13:16, 2025-12-13 13:16
AbuseIPDB
213.209.143.26 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-12-07 05:00:00.856000
Was present on blacklist at: 2025-12-07 05:00
DShield Block
213.209.143.26 was recently listed on the DShield Block blacklist, but currently it is not.

Description: Recommended Block List by DShield.org. It summarizes the top 20 attacking<br>class C (/24) subnets over the last three days.
Type of feed: secondary (feed detail page)

Last checked at: 2025-12-20 04:50:00
Was present on blacklist at: 2025-12-07 04:50, 2025-12-08 04:50, 2025-12-09 04:50, 2025-12-10 04:50
Spamhaus XBL CBL
213.209.143.26 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-20 13:16:20.064000
Was present on blacklist at: 2025-12-13 13:16
Warden events (57)
2025-12-15
ReconScanning (node.9c1411): 1
2025-12-14
ReconScanning (node.9c1411): 4
2025-12-13
ReconScanning (node.4dc198): 1
ReconScanning (node.368407): 1
ReconScanning (node.9c1411): 1
2025-12-12
ReconScanning (node.9c1411): 5
2025-12-11
ReconScanning (node.9c1411): 1
2025-12-10
ReconScanning (node.9c1411): 3
ReconScanning (node.4dc198): 13
ReconScanning (node.368407): 12
2025-12-09
ReconScanning (node.9c1411): 1
2025-12-07
ReconScanning (node.4dc198): 6
ReconScanning (node.368407): 5
2025-12-06
ReconScanning (node.4dc198): 2
ReconScanning (node.368407): 1
DShield reports (IP summary, reports)
2025-12-10
Number of reports: 61
Distinct targets: 52
Origin AS
AS214943 - RAILNET
AS42821 - RAPIDNET-DE
BGP Prefix
213.209.143.0/24
geo
Germany
🕑 Europe/Berlin
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
213.209.128.0 - 213.209.159.255
last_activity
2025-12-15 03:17:17
last_warden_event
2025-12-15 03:17:17
rep
0.19538341703869047
reserved_range
0
Shodan's InternetDB
Open ports: 22, 80
Tags:
CPEs: cpe:/a:apache:http_server:2.4.52, cpe:/a:openbsd:openssh:8.9p1, cpe:/o:canonical:ubuntu_linux
ts_added
2025-12-06 13:16:15.871000
ts_last_update
2025-12-20 13:16:20.098000

Warden event timeline

DShield event timeline

Presence on blacklists