IP address


.186213.209.143.75
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
Spamhaus SBL
213.209.143.75 is listed on the Spamhaus SBL blacklist.

Description: The Spamhaus Block List ("SBL") Advisory is a database of IP addresses from which Spamhaus does not recommend the acceptance of electronic mail.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-18 15:25:22.083000
Was present on blacklist at: 2025-11-27 15:25, 2025-12-04 15:25, 2025-12-11 15:25, 2025-12-18 15:25
Spamhaus DROP
213.209.143.75 is listed on the Spamhaus DROP blacklist.

Description: Spamhaus DROP (Don't Route Or Peer) list. Netblocks controlled by spammers or cyber criminals. The DROP lists are a tiny subset of the SBL, designed for use by firewalls and routing equipment to filter out the malicious traffic from these netblocks.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-18 15:25:22.083000
Was present on blacklist at: 2025-11-27 15:25, 2025-12-04 15:25, 2025-12-11 15:25, 2025-12-18 15:25
DShield Block
213.209.143.75 was recently listed on the DShield Block blacklist, but currently it is not.

Description: Recommended Block List by DShield.org. It summarizes the top 20 attacking<br>class C (/24) subnets over the last three days.
Type of feed: secondary (feed detail page)

Last checked at: 2025-12-20 04:50:00
Was present on blacklist at: 2025-11-27 04:50, 2025-11-30 04:50, 2025-12-07 04:50, 2025-12-08 04:50, 2025-12-09 04:50, 2025-12-10 04:50
AbuseIPDB
213.209.143.75 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-12-09 05:00:00.717000
Was present on blacklist at: 2025-11-28 05:00, 2025-11-30 05:00, 2025-12-02 05:00, 2025-12-03 05:00, 2025-12-08 05:00, 2025-12-09 05:00
UCEPROTECT L1
213.209.143.75 is listed on the UCEPROTECT L1 blacklist.

Description: UCEPROTECT-NETWORK list of spam IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-14 08:45:00.532000
Was present on blacklist at: 2025-11-29 08:45, 2025-11-29 16:45, 2025-11-30 00:45, 2025-11-30 08:45, 2025-11-30 16:45, 2025-12-01 00:45, 2025-12-01 08:45, 2025-12-01 16:45, 2025-12-02 00:45, 2025-12-02 08:45, 2025-12-02 16:45, 2025-12-03 00:45, 2025-12-03 08:45, 2025-12-03 16:45, 2025-12-04 00:45, 2025-12-04 08:45, 2025-12-04 16:45, 2025-12-05 00:45, 2025-12-05 08:45, 2025-12-05 16:45, 2025-12-06 00:45, 2025-12-06 08:45, 2025-12-06 16:45, 2025-12-07 16:45, 2025-12-08 00:45, 2025-12-08 08:45, 2025-12-08 16:45, 2025-12-09 00:45, 2025-12-09 08:45, 2025-12-09 16:45, 2025-12-10 00:45, 2025-12-10 08:45, 2025-12-10 16:45, 2025-12-11 00:45, 2025-12-11 08:45, 2025-12-11 16:45, 2025-12-12 00:45, 2025-12-12 08:45, 2025-12-12 16:45, 2025-12-13 00:45, 2025-12-13 08:45, 2025-12-13 16:45, 2025-12-14 00:45, 2025-12-14 08:45
Turris greylist
213.209.143.75 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-08 22:15:00.166000
Was present on blacklist at: 2025-12-03 22:15, 2025-12-04 22:15, 2025-12-05 22:15, 2025-12-08 22:15
Spamhaus XBL CBL
213.209.143.75 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-12-18 15:25:22.083000
Was present on blacklist at: 2025-12-04 15:25, 2025-12-11 15:25
DataPlane TELNET login
213.209.143.75 is listed on the DataPlane TELNET login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login via TELNET password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2025-12-14 11:10:02.086000
Was present on blacklist at: 2025-12-07 15:10, 2025-12-07 19:10, 2025-12-07 23:10, 2025-12-08 03:10, 2025-12-08 07:10, 2025-12-08 11:10, 2025-12-08 15:10, 2025-12-08 19:10, 2025-12-08 23:10, 2025-12-09 03:10, 2025-12-09 07:10, 2025-12-09 11:10, 2025-12-09 15:10, 2025-12-09 19:10, 2025-12-09 23:10, 2025-12-10 03:10, 2025-12-10 07:10, 2025-12-10 11:10, 2025-12-10 15:10, 2025-12-10 19:10, 2025-12-10 23:10, 2025-12-11 03:10, 2025-12-11 07:10, 2025-12-11 11:10, 2025-12-11 15:10, 2025-12-11 19:10, 2025-12-11 23:10, 2025-12-12 03:10, 2025-12-12 07:10, 2025-12-12 11:10, 2025-12-12 15:10, 2025-12-12 19:10, 2025-12-12 23:10, 2025-12-13 03:10, 2025-12-13 07:10, 2025-12-13 11:10, 2025-12-13 15:10, 2025-12-13 19:10, 2025-12-13 23:10, 2025-12-14 03:10, 2025-12-14 07:10, 2025-12-14 11:10
Warden events (623)
2025-12-14
ReconScanning (node.9c1411): 12
2025-12-13
ReconScanning (node.9c1411): 18
2025-12-12
ReconScanning (node.9c1411): 11
2025-12-11
ReconScanning (node.9c1411): 17
2025-12-10
ReconScanning (node.9c1411): 1
2025-12-09
AnomalyTraffic (node.ffe95c): 8
ReconScanning (node.368407): 22
ReconScanning (node.4dc198): 23
ReconScanning (node.9c1411): 14
2025-12-08
ReconScanning (node.4dc198): 6
ReconScanning (node.368407): 6
ReconScanning (node.9c1411): 1
2025-12-07
ReconScanning (node.9c1411): 13
ReconScanning (node.4dc198): 43
ReconScanning (node.368407): 43
IntrusionUserCompromise (node.cfb4f7): 119
2025-12-05
ReconScanning (node.4dc198): 26
ReconScanning (node.368407): 26
2025-12-04
ReconScanning (node.368407): 3
ReconScanning (node.4dc198): 2
2025-12-03
ReconScanning (node.9c1411): 11
2025-12-02
ReconScanning (node.9c1411): 36
2025-12-01
ReconScanning (node.9c1411): 42
2025-11-30
ReconScanning (node.368407): 7
ReconScanning (node.4dc198): 7
ReconScanning (node.9c1411): 27
2025-11-28
ReconScanning (node.4dc198): 20
ReconScanning (node.368407): 20
2025-11-27
ReconScanning (node.4dc198): 16
ReconScanning (node.368407): 23
DShield reports (IP summary, reports)
2025-11-27
Number of reports: 500
Distinct targets: 249
2025-11-28
Number of reports: 368
Distinct targets: 261
2025-11-29
Number of reports: 368
Distinct targets: 261
2025-11-30
Number of reports: 209
Distinct targets: 135
2025-12-03
Number of reports: 15
Distinct targets: 11
2025-12-04
Number of reports: 115
Distinct targets: 91
2025-12-05
Number of reports: 238
Distinct targets: 214
2025-12-08
Number of reports: 72
Distinct targets: 54
2025-12-09
Number of reports: 206
Distinct targets: 129
OTX pulses
[602bc528f447d628d41494f2] 2021-02-16 13:14:16.945000 | Ka's Honeypot visitors
Author name:Kapppppa
Pulse modified:2025-12-20 19:47:59.392000
Indicator created:2025-12-07 13:00:43
Indicator role:bruteforce
Indicator title:Telnet Login attempt
Indicator expiration:2026-01-06 13:00:00
Origin AS
AS214943 - RAILNET
AS42821 - RAPIDNET-DE
BGP Prefix
213.209.143.0/24
geo
Germany
🕑 Europe/Berlin
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
213.209.128.0 - 213.209.159.255
last_activity
2025-12-20 20:38:37.078000
last_warden_event
2025-12-14 09:00:49
rep
0.18568869091215587
reserved_range
0
Shodan's InternetDB
Open ports: 22
Tags:
CPEs: cpe:/a:openbsd:openssh:9.7p1, cpe:/o:canonical:ubuntu_linux
ts_added
2025-11-27 15:25:13.793000
ts_last_update
2025-12-20 20:38:37.086000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses