IP address


.985213.209.159.56
Shodan(more info)
Passive DNS
Tags: Login attempts
IP blacklists
Spamhaus SBL
213.209.159.56 is listed on the Spamhaus SBL blacklist.

Description: The Spamhaus Block List ("SBL") Advisory is a database of IP addresses from which Spamhaus does not recommend the acceptance of electronic mail.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-05-09 22:54:20.516000
Was present on blacklist at: 2026-05-02 22:54, 2026-05-09 22:54
Spamhaus DROP
213.209.159.56 is listed on the Spamhaus DROP blacklist.

Description: Spamhaus DROP (Don't Route Or Peer) list. Netblocks controlled by spammers or cyber criminals. The DROP lists are a tiny subset of the SBL, designed for use by firewalls and routing equipment to filter out the malicious traffic from these netblocks.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-05-09 22:54:20.516000
Was present on blacklist at: 2026-05-02 22:54, 2026-05-09 22:54
AbuseIPDB
213.209.159.56 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-05-14 04:00:00.604000
Was present on blacklist at: 2026-05-03 04:00, 2026-05-04 04:00, 2026-05-05 04:00, 2026-05-06 04:00, 2026-05-07 04:00, 2026-05-08 04:00, 2026-05-09 04:00, 2026-05-10 04:00, 2026-05-11 04:00, 2026-05-12 04:00, 2026-05-13 04:00, 2026-05-14 04:00
blocklist.de SSH
213.209.159.56 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-05-14 10:05:00.165000
Was present on blacklist at: 2026-05-03 04:05, 2026-05-03 10:05, 2026-05-03 16:05, 2026-05-03 22:05, 2026-05-04 04:05, 2026-05-04 10:05, 2026-05-04 16:05, 2026-05-04 22:05, 2026-05-05 04:05, 2026-05-05 10:05, 2026-05-05 16:05, 2026-05-06 04:05, 2026-05-06 10:05, 2026-05-06 16:05, 2026-05-06 22:05, 2026-05-07 04:05, 2026-05-07 10:05, 2026-05-07 16:05, 2026-05-07 22:05, 2026-05-08 04:05, 2026-05-08 10:05, 2026-05-08 16:05, 2026-05-08 22:05, 2026-05-09 04:05, 2026-05-09 10:05, 2026-05-09 16:05, 2026-05-09 22:05, 2026-05-10 04:05, 2026-05-10 10:05, 2026-05-10 16:05, 2026-05-10 22:05, 2026-05-11 04:05, 2026-05-11 10:05, 2026-05-11 16:05, 2026-05-11 22:05, 2026-05-12 04:05, 2026-05-12 10:05, 2026-05-12 16:05, 2026-05-12 22:05, 2026-05-13 04:05, 2026-05-13 10:05, 2026-05-13 16:05, 2026-05-13 22:05, 2026-05-14 04:05, 2026-05-14 10:05
UCEPROTECT L1
213.209.159.56 is listed on the UCEPROTECT L1 blacklist.

Description: UCEPROTECT-NETWORK list of spam IPs.
Type of feed: primary (feed detail page)

Last checked at: 2026-05-14 07:45:00.520000
Was present on blacklist at: 2026-05-03 07:45, 2026-05-03 15:45, 2026-05-03 23:45, 2026-05-04 07:45, 2026-05-04 15:45, 2026-05-04 23:45, 2026-05-05 07:45, 2026-05-05 15:45, 2026-05-05 23:45, 2026-05-06 07:45, 2026-05-06 15:45, 2026-05-06 23:45, 2026-05-07 07:45, 2026-05-07 15:45, 2026-05-07 23:45, 2026-05-08 07:45, 2026-05-08 15:45, 2026-05-08 23:45, 2026-05-09 07:45, 2026-05-09 15:45, 2026-05-09 23:45, 2026-05-10 07:45, 2026-05-10 15:45, 2026-05-10 23:45, 2026-05-11 07:45, 2026-05-11 15:45, 2026-05-11 23:45, 2026-05-12 07:45, 2026-05-12 15:45, 2026-05-12 23:45, 2026-05-13 07:45, 2026-05-13 15:45, 2026-05-13 23:45, 2026-05-14 07:45
Echelon SSH connection attempt
213.209.159.56 is listed on the Echelon SSH connection attempt blacklist.

Description: SSH connection attempt detected on port 22 or 2222
Type of feed: primary (feed detail page)

Last checked at: 2026-05-13 09:35:04.264000
Was present on blacklist at: 2026-05-03 09:35, 2026-05-04 09:35, 2026-05-05 09:35, 2026-05-07 09:35, 2026-05-08 09:35, 2026-05-09 09:35, 2026-05-10 09:35, 2026-05-11 09:35, 2026-05-13 09:35
Echelon SSH bruteforce
213.209.159.56 is listed on the Echelon SSH bruteforce blacklist.

Description: Multiple SSH authentication attempts detected
Type of feed: primary (feed detail page)

Last checked at: 2026-05-12 09:35:03.465000
Was present on blacklist at: 2026-05-03 09:35, 2026-05-04 09:35, 2026-05-05 09:35, 2026-05-07 09:35, 2026-05-08 09:35, 2026-05-09 09:35, 2026-05-10 09:35, 2026-05-11 09:35, 2026-05-12 09:35
FireHOL anonymizers
213.209.159.56 is listed on the FireHOL anonymizers blacklist.

Description: List of anonymizing IPs, aggregated from multiple lists by FireHOL.
Type of feed: secondary (feed detail page)

Last checked at: 2026-05-14 00:05:12
Was present on blacklist at: 2026-05-07 00:05, 2026-05-08 00:05, 2026-05-09 00:05, 2026-05-10 00:05, 2026-05-11 00:05, 2026-05-12 00:05, 2026-05-13 00:05, 2026-05-14 00:05
Spamhaus XBL CBL
213.209.159.56 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-05-09 22:54:20.516000
Was present on blacklist at: 2026-05-09 22:54

Threat categories

TLRoleCategoryDetails
75 src login protocol: ssh
port: 22, 2222
61 src scan port: 22
46 src

Warden events (2674)
2026-05-14
AttemptLogin (node.d2ecc6): 10
AttemptLogin (node.ce2b59): 5
AttemptLogin (node.03e7a9): 43
AttemptLogin (node.9c160c): 10
AttemptLogin (node.ee25b8): 8
AttemptLogin (node.70e749): 10
AttemptLogin (node.b17ef8): 10
AttemptLogin (node.985fb4): 10
AttemptLogin (node.eef996): 10
2026-05-13
AttemptLogin (node.985fb4): 20
AttemptLogin (node.03e7a9): 93
AttemptLogin (node.ce2b59): 9
AttemptLogin (node.9c160c): 20
AttemptLogin (node.d2ecc6): 20
AttemptLogin (node.70e749): 19
AttemptLogin (node.eef996): 19
AttemptLogin (node.b17ef8): 17
AttemptLogin (node.ee25b8): 2
2026-05-12
AttemptLogin (node.b7f4d1): 9
ReconScanning (node.9c1411): 1
AttemptLogin (node.ce2b59): 8
AttemptLogin (node.03e7a9): 90
AttemptLogin (node.9c160c): 19
AttemptLogin (node.ee25b8): 15
AttemptLogin (node.d2ecc6): 19
AttemptLogin (node.70e749): 19
AttemptLogin (node.eef996): 19
AttemptLogin (node.28c168): 14
AttemptLogin (node.b17ef8): 19
AttemptLogin (node.985fb4): 18
2026-05-11
AttemptLogin (node.03e7a9): 46
AttemptLogin (node.70e749): 10
AttemptLogin (node.e1f86c): 1
AttemptLogin (node.9c160c): 9
AttemptLogin (node.eef996): 9
AttemptLogin (node.28c168): 9
AttemptLogin (node.b17ef8): 9
AttemptLogin (node.d2ecc6): 8
AttemptLogin (node.985fb4): 9
AttemptLogin (node.ce2b59): 3
ReconScanning (node.9c1411): 14
AttemptLogin (node.b7f4d1): 4
AttemptLogin (node.ee25b8): 1
2026-05-10
AttemptLogin (node.985fb4): 20
AttemptLogin (node.03e7a9): 94
AttemptLogin (node.ee25b8): 5
AttemptLogin (node.b7f4d1): 4
AttemptLogin (node.70e749): 19
AttemptLogin (node.9c160c): 19
AttemptLogin (node.eef996): 19
AttemptLogin (node.28c168): 19
AttemptLogin (node.b17ef8): 19
AttemptLogin (node.d2ecc6): 19
AttemptLogin (node.ce2b59): 8
2026-05-09
ReconScanning (node.9c1411): 12
AttemptLogin (node.03e7a9): 99
AttemptLogin (node.ee25b8): 6
AttemptLogin (node.9c160c): 20
AttemptLogin (node.70e749): 20
AttemptLogin (node.eef996): 20
AttemptLogin (node.b17ef8): 20
AttemptLogin (node.28c168): 20
AttemptLogin (node.d2ecc6): 20
AttemptLogin (node.985fb4): 19
AttemptLogin (node.ce2b59): 9
AttemptLogin (node.b7f4d1): 3
2026-05-08
AttemptLogin (node.b7f4d1): 20
AttemptLogin (node.03e7a9): 96
AttemptLogin (node.70e749): 19
AttemptLogin (node.9c160c): 19
AttemptLogin (node.eef996): 18
AttemptLogin (node.28c168): 19
AttemptLogin (node.b17ef8): 19
AttemptLogin (node.d2ecc6): 19
AttemptLogin (node.ce2b59): 9
AttemptLogin (node.985fb4): 19
AttemptLogin (node.ee25b8): 18
ReconScanning (node.9c1411): 4
2026-05-07
AttemptLogin (node.03e7a9): 99
AttemptLogin (node.70e749): 20
AttemptLogin (node.b17ef8): 20
AttemptLogin (node.28c168): 20
AttemptLogin (node.d2ecc6): 20
AttemptLogin (node.ce2b59): 9
AttemptLogin (node.eef996): 20
AttemptLogin (node.985fb4): 20
AttemptLogin (node.9c160c): 19
AttemptLogin (node.b7f4d1): 2
AttemptLogin (node.ee25b8): 1
2026-05-06
AttemptLogin (node.03e7a9): 99
AttemptLogin (node.b17ef8): 19
AttemptLogin (node.d2ecc6): 19
AttemptLogin (node.28c168): 19
AttemptLogin (node.e1f86c): 6
AttemptLogin (node.985fb4): 19
AttemptLogin (node.eef996): 19
AttemptLogin (node.9c160c): 19
AttemptLogin (node.ee25b8): 1
AttemptLogin (node.70e749): 18
AttemptLogin (node.ce2b59): 8
2026-05-05
AttemptLogin (node.ce2b59): 10
AttemptLogin (node.03e7a9): 104
AttemptLogin (node.e1f86c): 11
AttemptLogin (node.70e749): 20
AttemptLogin (node.28c168): 19
AttemptLogin (node.eef996): 19
AttemptLogin (node.b17ef8): 19
AttemptLogin (node.985fb4): 19
AttemptLogin (node.d2ecc6): 18
AttemptLogin (node.9c160c): 7
AttemptLogin (node.ee25b8): 2
AttemptLogin (node.b7f4d1): 2
2026-05-04
AttemptLogin (node.03e7a9): 102
AttemptLogin (node.b7f4d1): 3
AttemptLogin (node.eef996): 19
AttemptLogin (node.b17ef8): 19
AttemptLogin (node.985fb4): 19
AttemptLogin (node.d2ecc6): 19
AttemptLogin (node.70e749): 18
AttemptLogin (node.ee25b8): 4
AttemptLogin (node.e1f86c): 18
AttemptLogin (node.28c168): 18
AttemptLogin (node.ce2b59): 8
IntrusionUserCompromise (node.03e7a9): 6
IntrusionUserCompromise (node.70e749): 1
IntrusionUserCompromise (node.e1f86c): 1
IntrusionUserCompromise (node.28c168): 1
IntrusionUserCompromise (node.eef996): 1
IntrusionUserCompromise (node.b17ef8): 1
IntrusionUserCompromise (node.985fb4): 1
IntrusionUserCompromise (node.d2ecc6): 1
2026-05-03
AttemptLogin (node.03e7a9): 60
AttemptLogin (node.eef996): 10
AttemptLogin (node.b17ef8): 10
AttemptLogin (node.985fb4): 10
AttemptLogin (node.d2ecc6): 10
AttemptLogin (node.70e749): 12
AttemptLogin (node.e1f86c): 12
AttemptLogin (node.28c168): 11
AttemptLogin (node.ce2b59): 5
AttemptLogin (node.ee25b8): 7
AttemptLogin (node.b7f4d1): 4
AttemptLogin (node.40929a): 1
2026-05-02
AttemptLogin (node.03e7a9): 4
AttemptLogin (node.70e749): 1
AttemptLogin (node.e1f86c): 1
AttemptLogin (node.28c168): 1
DShield reports (IP summary, reports)
2026-05-02
Number of reports: 94
Distinct targets: 70
2026-05-03
Number of reports: 94
Distinct targets: 70
2026-05-04
Number of reports: 1478
Distinct targets: 119
2026-05-05
Number of reports: 2938
Distinct targets: 109
2026-05-06
Number of reports: 3139
Distinct targets: 118
2026-05-07
Number of reports: 2675
Distinct targets: 126
2026-05-08
Number of reports: 2675
Distinct targets: 126
2026-05-09
Number of reports: 3070
Distinct targets: 113
2026-05-10
Number of reports: 1691
Distinct targets: 89
2026-05-11
Number of reports: 317
Distinct targets: 21
2026-05-12
Number of reports: 1452
Distinct targets: 126
2026-05-13
Number of reports: 3095
Distinct targets: 114
Origin AS
AS208137 - FPS12
BGP Prefix
213.209.159.0/24
geo
Taiwan
🕑 Asia/Taipei
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
213.209.128.0 - 213.209.159.255
last_activity
2026-05-14 12:44:58.031000
last_warden_event
2026-05-14 12:44:58.031000
rep
0.9849178011859221
reserved_range
0
ts_added
2026-05-02 22:54:18.555000
ts_last_update
2026-05-14 12:45:06.120000

Warden event timeline

DShield event timeline

Presence on blacklists