IP address


.33223.95.248.4823-95-248-48-host.colocrossing.com
Shodan(more info)
Passive DNS
Tags: IP in hostname Login attempts
IP blacklists
Spamhaus SBL CSS
23.95.248.48 was recently listed on the Spamhaus SBL CSS blacklist, but currently it is not.

Description: The Spamhaus CSS is part of the SBL. CSS listings will have return code 127.0.0.3 to differentiate from regular SBL listings, which have return code 127.0.0.2.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-04-03 08:49:02.140000
Was present on blacklist at: 2026-03-27 08:48
blocklist.de SSH
23.95.248.48 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-07 04:05:00.293000
Was present on blacklist at: 2026-03-27 11:05, 2026-03-27 17:05, 2026-03-28 05:05, 2026-03-28 11:05, 2026-03-28 17:05, 2026-03-28 23:05, 2026-03-29 04:05, 2026-03-29 10:05, 2026-03-29 16:05, 2026-03-29 22:05, 2026-03-30 10:05, 2026-03-30 16:05, 2026-03-30 22:05, 2026-03-31 04:05, 2026-03-31 10:05, 2026-03-31 16:05, 2026-03-31 22:05, 2026-04-01 04:05, 2026-04-01 10:05, 2026-04-01 16:05, 2026-04-01 22:05, 2026-04-02 04:05, 2026-04-02 10:05, 2026-04-02 16:05, 2026-04-02 22:05, 2026-04-03 04:05, 2026-04-03 10:05, 2026-04-03 22:05, 2026-04-04 04:05, 2026-04-04 22:05, 2026-04-05 10:05, 2026-04-05 16:05, 2026-04-06 16:05, 2026-04-06 22:05, 2026-04-07 04:05
blocklist.de FTP
23.95.248.48 is listed on the blocklist.de FTP blacklist.

Description: Blocklist.de feed is a free and voluntary service<br>provided by a Fraud/Abuse-specialist. IPs performing attacks<br>on the Service FTP.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-30 04:05:00.123000
Was present on blacklist at: 2026-03-27 23:05, 2026-03-30 04:05
AbuseIPDB
23.95.248.48 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-04-06 04:00:00.569000
Was present on blacklist at: 2026-03-28 05:00, 2026-03-29 04:00, 2026-04-01 04:00, 2026-04-03 04:00, 2026-04-04 04:00, 2026-04-05 04:00, 2026-04-06 04:00
Echelon SSH bruteforce
23.95.248.48 is listed on the Echelon SSH bruteforce blacklist.

Description: Multiple SSH authentication attempts detected
Type of feed: primary (feed detail page)

Last checked at: 2026-04-05 09:35:00.509000
Was present on blacklist at: 2026-03-29 09:35, 2026-03-30 09:35, 2026-03-31 09:35, 2026-04-01 09:35, 2026-04-02 09:35, 2026-04-03 09:35, 2026-04-04 09:35, 2026-04-05 09:35
blocklist.de SIP
23.95.248.48 is listed on the blocklist.de SIP blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IP addresses that tried to login in a SIP,<br>VOIP or Asterisk Server.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-04 16:05:00.087000
Was present on blacklist at: 2026-04-04 10:05, 2026-04-04 16:05
blocklist.de web-login
23.95.248.48 is listed on the blocklist.de web-login blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-06 10:05:05.187000
Was present on blacklist at: 2026-04-05 04:05, 2026-04-05 22:05, 2026-04-06 04:05, 2026-04-06 10:05
blocklist.de Apache
23.95.248.48 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-04-06 10:05:05.245000
Was present on blacklist at: 2026-04-05 04:05, 2026-04-05 22:05, 2026-04-06 04:05, 2026-04-06 10:05

Threat categories

TLRoleCategoryDetails
60 src login protocol: ssh
port: 22
53 src scan port: 22
34 src
25 src botnet_drone

Warden events (96)
2026-04-05
AttemptLogin (node.40929a): 1
IntrusionUserCompromise (node.40929a): 2
2026-04-04
Malware (node.eef996): 1
IntrusionUserCompromise (node.eef996): 1
AttemptLogin (node.eef996): 1
2026-04-02
AttemptLogin (node.ce2b59): 3
ReconScanning (node.ce2b59): 1
2026-04-01
AttemptLogin (node.03e7a9): 23
2026-03-31
AttemptLogin (node.03e7a9): 3
2026-03-29
AttemptLogin (node.eef996): 12
AttemptLogin (node.ce2b59): 5
2026-03-28
AttemptLogin (node.28c168): 8
AttemptLogin (node.70e749): 18
2026-03-27
AttemptLogin (node.ce2b59): 6
AttemptLogin (node.28c168): 11
DShield reports (IP summary, reports)
2026-03-27
Number of reports: 381
Distinct targets: 12
2026-03-28
Number of reports: 438
Distinct targets: 10
2026-03-29
Number of reports: 438
Distinct targets: 10
2026-03-30
Number of reports: 309
Distinct targets: 12
2026-03-31
Number of reports: 309
Distinct targets: 12
2026-04-01
Number of reports: 555
Distinct targets: 17
2026-04-02
Number of reports: 298
Distinct targets: 12
2026-04-03
Number of reports: 326
Distinct targets: 10
2026-04-04
Number of reports: 414
Distinct targets: 10
2026-04-05
Number of reports: 365
Distinct targets: 9
Origin AS
AS36352 - AS-COLOCROSSING
BGP Prefix
23.95.248.0/24
geo
United States, Los Angeles
🕑 America/Los_Angeles
hostname
23-95-248-48-host.colocrossing.com
hostname_class
['ip_in_hostname']
Address block ('inetnum' or 'NetRange' in whois database)
23.94.0.0 - 23.95.255.255
last_activity
2026-04-05 08:31:08.316000
last_warden_event
2026-04-05 08:31:08.316000
rep
0.33214231218610485
reserved_range
0
Shodan's InternetDB
Open ports: 443
Tags:
CPEs:
ts_added
2026-03-27 08:48:57.816000
ts_last_update
2026-04-07 04:09:07.422000

Warden event timeline

DShield event timeline

Presence on blacklists