IP address
Shodan(more info)

Passive DNS

Tags:
Static IP
IP in hostname
- IP blacklists
- Blocklist.net.ua213.238.183.60 is listed on the Blocklist.net.ua blacklist.Spamhaus SBL CSS
Description: BlockList contains IP addresses that perform attacks,<br>send spam or brute force passwords to the blocking list.
Type of feed: primary (feed detail page)
Last checked at: 2025-12-12 15:15:01.200000
Was present on blacklist at: 2025-11-29 23:15, 2025-11-30 03:15, 2025-11-30 07:15, 2025-11-30 11:15, 2025-11-30 15:15, 2025-11-30 19:15, 2025-12-11 19:15, 2025-12-11 23:15, 2025-12-12 03:15, 2025-12-12 07:15, 2025-12-12 11:15, 2025-12-12 15:15213.238.183.60 is listed on the Spamhaus SBL CSS blacklist.Spamhaus XBL CBL
Description: The Spamhaus CSS is part of the SBL. CSS listings will have return code 127.0.0.3 to differentiate from regular SBL listings, which have return code 127.0.0.2.
Type of feed: secondary (DNSBL) (feed detail page)
Last checked at: 2025-12-13 23:54:50.239000
Was present on blacklist at: 2025-11-29 23:54, 2025-12-13 23:54213.238.183.60 is listed on the Spamhaus XBL CBL blacklist.blocklist.de web-login
Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)
Last checked at: 2025-12-13 23:54:50.239000
Was present on blacklist at: 2025-11-29 23:54, 2025-12-06 23:54, 2025-12-13 23:54213.238.183.60 is listed on the blocklist.de web-login blacklist.blocklist.de Apache
Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)
Last checked at: 2025-12-17 17:05:00.519000
Was present on blacklist at: 2025-12-02 23:05, 2025-12-03 05:05, 2025-12-03 11:05, 2025-12-03 17:05, 2025-12-03 23:05, 2025-12-04 05:05, 2025-12-04 11:05, 2025-12-04 17:05, 2025-12-04 23:05, 2025-12-05 05:05, 2025-12-05 11:05, 2025-12-05 17:05, 2025-12-05 23:05, 2025-12-06 05:05, 2025-12-06 11:05, 2025-12-06 17:05, 2025-12-06 23:05, 2025-12-07 05:05, 2025-12-07 11:05, 2025-12-07 17:05, 2025-12-07 23:05, 2025-12-08 05:05, 2025-12-08 11:05, 2025-12-08 17:05, 2025-12-08 23:05, 2025-12-09 05:05, 2025-12-09 11:05, 2025-12-09 17:05, 2025-12-09 23:05, 2025-12-10 05:05, 2025-12-10 11:05, 2025-12-10 17:05, 2025-12-10 23:05, 2025-12-11 05:05, 2025-12-11 11:05, 2025-12-11 17:05, 2025-12-11 23:05, 2025-12-12 05:05, 2025-12-12 11:05, 2025-12-12 17:05, 2025-12-12 23:05, 2025-12-13 05:05, 2025-12-13 11:05, 2025-12-13 17:05, 2025-12-13 23:05, 2025-12-14 05:05, 2025-12-14 11:05, 2025-12-14 17:05, 2025-12-14 23:05, 2025-12-15 05:05, 2025-12-15 11:05, 2025-12-15 17:05, 2025-12-15 23:05, 2025-12-16 05:05, 2025-12-16 11:05, 2025-12-16 17:05, 2025-12-16 23:05, 2025-12-17 05:05, 2025-12-17 11:05, 2025-12-17 17:05213.238.183.60 is listed on the blocklist.de Apache blacklist.AbuseIPDB
Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)
Last checked at: 2025-12-17 17:05:00.632000
Was present on blacklist at: 2025-12-02 23:05, 2025-12-03 05:05, 2025-12-03 11:05, 2025-12-03 17:05, 2025-12-03 23:05, 2025-12-04 05:05, 2025-12-04 11:05, 2025-12-04 17:05, 2025-12-04 23:05, 2025-12-05 05:05, 2025-12-05 11:05, 2025-12-05 17:05, 2025-12-05 23:05, 2025-12-06 05:05, 2025-12-06 11:05, 2025-12-06 17:05, 2025-12-06 23:05, 2025-12-07 05:05, 2025-12-07 11:05, 2025-12-07 17:05, 2025-12-07 23:05, 2025-12-08 05:05, 2025-12-08 11:05, 2025-12-08 17:05, 2025-12-08 23:05, 2025-12-09 05:05, 2025-12-09 11:05, 2025-12-09 17:05, 2025-12-09 23:05, 2025-12-10 05:05, 2025-12-10 11:05, 2025-12-10 17:05, 2025-12-10 23:05, 2025-12-11 05:05, 2025-12-11 11:05, 2025-12-11 17:05, 2025-12-11 23:05, 2025-12-12 05:05, 2025-12-12 11:05, 2025-12-12 17:05, 2025-12-12 23:05, 2025-12-13 05:05, 2025-12-13 11:05, 2025-12-13 17:05, 2025-12-13 23:05, 2025-12-14 05:05, 2025-12-14 11:05, 2025-12-14 17:05, 2025-12-14 23:05, 2025-12-15 05:05, 2025-12-15 11:05, 2025-12-15 17:05, 2025-12-15 23:05, 2025-12-16 05:05, 2025-12-16 11:05, 2025-12-16 17:05, 2025-12-16 23:05, 2025-12-17 05:05, 2025-12-17 11:05, 2025-12-17 17:05213.238.183.60 is listed on the AbuseIPDB blacklist.
Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)
Last checked at: 2025-12-04 05:00:00.704000
Was present on blacklist at: 2025-12-04 05:00
- Origin AS
- AS213252 - CENUTA
- BGP Prefix
- 213.238.183.0/24
- geo
- Turkey
- 🕑 Europe/Istanbul
- hostname
- 60.183.238.213.static.cenuta.com
- hostname_class
- ['ip_in_hostname', 'static']
- Address block ('inetnum' or 'NetRange' in whois database)
- 213.238.128.0 - 213.238.191.255
- reserved_range
- 0
- Shodan's InternetDB
- Open ports: 21, 53, 80, 110, 143, 443, 465, 587, 993, 995, 2082, 2083, 2087, 2096, 3306
- Tags: database, starttls
- CPEs: cpe:/a:exim:exim:4.96.2, cpe:/a:oracle:mysql:8.0.31-cll-lve, cpe:/a:pureftpd:pure-ftpd, cpe:/a:litespeedtech:litespeed_web_server
- ts_added
- 2025-11-29 23:54:41.770000
- ts_last_update
- 2025-12-17 17:06:49.917000
Warden event timeline
DShield event timeline
Presence on blacklists

