IP address


.000213.209.143.44
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
Spamhaus SBL
213.209.143.44 is listed on the Spamhaus SBL blacklist.

Description: The Spamhaus Block List ("SBL") Advisory is a database of IP addresses from which Spamhaus does not recommend the acceptance of electronic mail.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-18 17:05:00.195000
Was present on blacklist at: 2025-09-25 17:05, 2025-10-02 17:05, 2025-10-09 17:07, 2025-10-16 17:05, 2025-10-23 17:05, 2025-10-30 17:05, 2025-11-06 17:05, 2025-11-13 17:05, 2025-11-20 17:05, 2025-11-27 17:05, 2025-12-04 17:05, 2025-12-11 17:05, 2025-12-18 17:05
Spamhaus DROP
213.209.143.44 is listed on the Spamhaus DROP blacklist.

Description: Spamhaus DROP (Don't Route Or Peer) list. Netblocks controlled by spammers or cyber criminals. The DROP lists are a tiny subset of the SBL, designed for use by firewalls and routing equipment to filter out the malicious traffic from these netblocks.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-18 17:05:00.195000
Was present on blacklist at: 2025-09-25 17:05, 2025-10-02 17:05, 2025-10-09 17:07, 2025-10-16 17:05, 2025-10-23 17:05, 2025-10-30 17:05, 2025-11-06 17:05, 2025-11-13 17:05, 2025-11-20 17:05, 2025-11-27 17:05, 2025-12-04 17:05, 2025-12-11 17:05, 2025-12-18 17:05
DShield Block
213.209.143.44 was recently listed on the DShield Block blacklist, but currently it is not.

Description: Recommended Block List by DShield.org. It summarizes the top 20 attacking<br>class C (/24) subnets over the last three days.
Type of feed: secondary (feed detail page)

Last checked at: 2025-12-19 04:50:00
Was present on blacklist at: 2025-10-23 04:50, 2025-11-27 04:50, 2025-11-30 04:50, 2025-12-07 04:50, 2025-12-08 04:50, 2025-12-09 04:50, 2025-12-10 04:50
ThreatFox
213.209.143.44 is listed on the ThreatFox blacklist.

Description: ThreatFox is a free platform from abuse.ch with the goal of<br>sharing indicators of compromise (IOCs) associated with malware with the<br>infosec community, AV vendors and threat intelligence providers.
Type of feed: primary (feed detail page)

Last checked at: 2025-09-28 18:10:00.282000
Was present on blacklist at: 2025-09-26 22:10, 2025-09-27 02:10, 2025-09-27 06:10, 2025-09-27 10:10, 2025-09-27 14:10, 2025-09-27 18:10, 2025-09-27 22:10, 2025-09-28 02:10, 2025-09-28 06:10, 2025-09-28 10:10, 2025-09-28 14:10, 2025-09-28 18:10
Turris greylist
213.209.143.44 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-11-30 22:15:00.157000
Was present on blacklist at: 2025-09-21 21:15, 2025-09-22 21:15, 2025-10-04 21:15, 2025-11-21 22:15, 2025-11-22 22:15, 2025-11-23 22:15, 2025-11-24 22:15, 2025-11-25 22:15, 2025-11-26 22:15, 2025-11-29 22:15, 2025-11-30 22:15
AbuseIPDB
213.209.143.44 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-11-29 05:00:00.723000
Was present on blacklist at: 2025-09-21 04:00, 2025-09-22 04:00, 2025-09-23 04:00, 2025-09-24 04:00, 2025-09-25 04:00, 2025-09-26 04:00, 2025-09-27 04:00, 2025-10-02 04:00, 2025-10-20 04:00, 2025-10-21 04:00, 2025-10-26 05:00, 2025-11-19 05:00, 2025-11-20 05:00, 2025-11-21 05:00, 2025-11-23 05:00, 2025-11-27 05:00, 2025-11-29 05:00
DataPlane TELNET login
213.209.143.44 is listed on the DataPlane TELNET login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login via TELNET password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-02 15:10:03.050000
Was present on blacklist at: 2025-11-19 23:10, 2025-11-20 03:10, 2025-11-20 07:10, 2025-11-20 11:10, 2025-11-20 15:10, 2025-11-20 19:10, 2025-11-20 23:10, 2025-11-21 03:10, 2025-11-21 07:10, 2025-11-21 11:10, 2025-11-21 15:10, 2025-11-21 19:10, 2025-11-21 23:10, 2025-11-22 03:10, 2025-11-22 07:10, 2025-11-22 11:10, 2025-11-22 15:10, 2025-11-22 19:10, 2025-11-22 23:10, 2025-11-23 03:10, 2025-11-23 07:10, 2025-11-23 11:10, 2025-11-23 15:10, 2025-11-23 19:10, 2025-11-23 23:10, 2025-11-24 03:10, 2025-11-24 07:10, 2025-11-24 11:10, 2025-11-24 15:10, 2025-11-24 19:10, 2025-11-24 23:10, 2025-11-25 03:10, 2025-11-25 07:10, 2025-11-25 11:10, 2025-11-25 15:10, 2025-11-25 19:10, 2025-11-25 23:10, 2025-11-26 03:10, 2025-11-26 07:10, 2025-11-26 11:10, 2025-11-26 15:10, 2025-11-26 19:10, 2025-11-26 23:10, 2025-11-27 03:10, 2025-11-27 07:10, 2025-11-27 11:10, 2025-11-27 15:10, 2025-11-27 19:10, 2025-11-27 23:10, 2025-11-28 03:10, 2025-11-28 07:10, 2025-11-28 11:10, 2025-11-28 15:10, 2025-11-28 19:10, 2025-11-28 23:10, 2025-11-29 03:10, 2025-11-29 07:10, 2025-11-29 11:10, 2025-11-29 15:10, 2025-11-29 19:10, 2025-11-29 23:11, 2025-11-30 03:10, 2025-11-30 07:10, 2025-11-30 11:10, 2025-11-30 15:10, 2025-11-30 19:10, 2025-11-30 23:10, 2025-12-01 03:10, 2025-12-01 07:10, 2025-12-01 11:10, 2025-12-01 15:10, 2025-12-01 19:10, 2025-12-01 23:10, 2025-12-02 03:10, 2025-12-02 07:10, 2025-12-02 11:10, 2025-12-02 15:10
Spamhaus XBL CBL
213.209.143.44 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-18 17:05:00.195000
Was present on blacklist at: 2025-11-20 17:05, 2025-11-27 17:05, 2025-12-04 17:05
Warden events (2750)
2025-12-05
ReconScanning (node.9c1411): 12
2025-12-04
ReconScanning (node.9c1411): 13
2025-12-03
ReconScanning (node.9c1411): 8
2025-12-02
ReconScanning (node.368407): 65
ReconScanning (node.4dc198): 65
AnomalyTraffic (node.ffe95c): 16
ReconScanning (node.9c1411): 2
2025-12-01
ReconScanning (node.9c1411): 1
ReconScanning (node.4dc198): 27
ReconScanning (node.368407): 23
AnomalyTraffic (node.ffe95c): 8
2025-11-29
ReconScanning (node.4dc198): 12
ReconScanning (node.368407): 11
AnomalyTraffic (node.ffe95c): 2
ReconScanning (node.9c1411): 11
IntrusionUserCompromise (node.cfb4f7): 6
2025-11-28
ReconScanning (node.9c1411): 25
ReconScanning (node.368407): 42
ReconScanning (node.4dc198): 48
AnomalyTraffic (node.ffe95c): 12
2025-11-27
ReconScanning (node.9c1411): 39
2025-11-26
ReconScanning (node.9c1411): 18
2025-11-25
ReconScanning (node.9c1411): 18
ReconScanning (node.4dc198): 2
ReconScanning (node.368407): 1
2025-11-24
ReconScanning (node.9c1411): 20
2025-11-23
ReconScanning (node.9c1411): 28
2025-11-22
ReconScanning (node.9c1411): 20
2025-11-21
ReconScanning (node.9c1411): 11
2025-11-20
ReconScanning (node.9c1411): 2
2025-11-19
ReconScanning (node.368407): 12
ReconScanning (node.4dc198): 14
ReconScanning (node.9c1411): 16
2025-11-17
ReconScanning (node.4dc198): 2
ReconScanning (node.368407): 2
2025-11-16
ReconScanning (node.4dc198): 39
ReconScanning (node.368407): 39
AnomalyTraffic (node.ffe95c): 9
2025-10-28
ReconScanning (node.4dc198): 15
ReconScanning (node.368407): 14
ReconScanning (node.9c1411): 3
2025-10-27
ReconScanning (node.4dc198): 36
ReconScanning (node.368407): 36
ReconScanning (node.9c1411): 9
2025-10-26
ReconScanning (node.368407): 157
ReconScanning (node.4dc198): 156
ReconScanning (node.9c1411): 32
2025-10-25
ReconScanning (node.4dc198): 46
ReconScanning (node.368407): 46
ReconScanning (node.9c1411): 14
2025-10-20
ReconScanning (node.4dc198): 42
ReconScanning (node.368407): 41
ReconScanning (node.9c1411): 11
2025-10-19
ReconScanning (node.4dc198): 108
ReconScanning (node.368407): 108
ReconScanning (node.9c1411): 29
2025-10-18
ReconScanning (node.9c1411): 1
2025-10-10
ReconScanning (node.4dc198): 14
ReconScanning (node.368407): 13
2025-10-05
ReconScanning (node.4dc198): 1
ReconScanning (node.9c1411): 1
2025-10-04
ReconScanning (node.9c1411): 6
ReconScanning (node.4dc198): 1
ReconScanning (node.368407): 1
2025-10-03
ReconScanning (node.9c1411): 13
ReconScanning (node.368407): 9
ReconScanning (node.4dc198): 9
2025-10-02
ReconScanning (node.9c1411): 14
2025-10-01
IntrusionBotnet (node.bc2d71): 4
ReconScanning (node.9c1411): 2
ReconScanning (node.368407): 1
2025-09-30
IntrusionBotnet (node.bc2d71): 21
ReconScanning (node.9c1411): 11
ReconScanning (node.4dc198): 3
ReconScanning (node.368407): 3
2025-09-29
ReconScanning (node.9c1411): 10
2025-09-28
ReconScanning (node.9c1411): 30
2025-09-27
ReconScanning (node.9c1411): 23
2025-09-26
ReconScanning (node.9c1411): 27
2025-09-25
ReconScanning (node.9c1411): 21
2025-09-24
ReconScanning (node.9c1411): 54
2025-09-23
ReconScanning (node.9c1411): 41
2025-09-22
ReconScanning (node.9c1411): 74
ReconScanning (node.4dc198): 1
2025-09-21
IntrusionUserCompromise (node.cfb4f7): 441
ReconScanning (node.4dc198): 9
AnomalyTraffic (node.ffe95c): 3
ReconScanning (node.9c1411): 18
AnomalyTraffic (node.86dac8): 2
ReconScanning (node.368407): 1
2025-09-20
AnomalyTraffic (node.ffe95c): 11
ReconScanning (node.4dc198): 49
IntrusionUserCompromise (node.cfb4f7): 148
ReconScanning (node.368407): 43
ReconScanning (node.9c1411): 5
AnomalyTraffic (node.86dac8): 7
DShield reports (IP summary, reports)
2025-09-20
Number of reports: 2421
Distinct targets: 937
2025-09-21
Number of reports: 2502
Distinct targets: 581
2025-09-22
Number of reports: 770
Distinct targets: 483
2025-09-23
Number of reports: 517
Distinct targets: 279
2025-09-25
Number of reports: 701
Distinct targets: 470
2025-09-26
Number of reports: 427
Distinct targets: 277
2025-09-28
Number of reports: 180
Distinct targets: 114
2025-09-29
Number of reports: 180
Distinct targets: 114
2025-10-03
Number of reports: 409
Distinct targets: 234
2025-10-10
Number of reports: 90
Distinct targets: 55
2025-10-20
Number of reports: 884
Distinct targets: 276
2025-10-25
Number of reports: 401
Distinct targets: 158
2025-10-26
Number of reports: 401
Distinct targets: 158
2025-10-27
Number of reports: 310
Distinct targets: 165
2025-10-28
Number of reports: 102
Distinct targets: 55
2025-11-19
Number of reports: 212
Distinct targets: 138
2025-11-20
Number of reports: 212
Distinct targets: 138
2025-11-21
Number of reports: 63
Distinct targets: 14
2025-11-22
Number of reports: 50
Distinct targets: 16
2025-11-23
Number of reports: 42
Distinct targets: 13
2025-11-24
Number of reports: 49
Distinct targets: 14
2025-11-25
Number of reports: 49
Distinct targets: 14
2025-11-27
Number of reports: 15
Distinct targets: 6
2025-11-28
Number of reports: 479
Distinct targets: 274
2025-11-29
Number of reports: 479
Distinct targets: 274
2025-12-01
Number of reports: 159
Distinct targets: 107
2025-12-02
Number of reports: 159
Distinct targets: 107
2025-12-03
Number of reports: 461
Distinct targets: 285
Origin AS
AS214943 - RAILNET
AS42821 - RAPIDNET-DE
BGP Prefix
213.209.143.0/24
geo
Germany
🕑 Europe/Berlin
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
213.209.128.0 - 213.209.159.255
last_activity
2025-12-05 20:40:23
last_warden_event
2025-12-05 20:40:23
rep
0.0
reserved_range
0
Shodan's InternetDB
Open ports: 22, 80
Tags: scanner
CPEs: cpe:/o:canonical:ubuntu_linux, cpe:/a:openbsd:openssh:8.2p1, cpe:/a:apache:http_server:2.4.41
ts_added
2025-05-01 17:04:55.465000
ts_last_update
2025-12-19 17:05:00.195000

Warden event timeline

DShield event timeline

Presence on blacklists