IP address


.31039.105.42.225
Shodan(more info)
Passive DNS
Tags:
IP blacklists
Spamhaus PBL
39.105.42.225 is listed on the Spamhaus PBL blacklist.

Description: The Spamhaus PBL is a DNSBL database of end-user IP address ranges which should not be delivering unauthenticated SMTP email to any Internet mail server except those provided for specifically by an ISP for that customer's use.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-05-03 13:00:34.247000
Was present on blacklist at: 2025-05-03 13:00
blocklist.de SSH
39.105.42.225 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-05-07 04:05:05.500000
Was present on blacklist at: 2025-05-03 22:05, 2025-05-04 04:05, 2025-05-04 10:05, 2025-05-04 16:05, 2025-05-04 22:05, 2025-05-05 04:05, 2025-05-05 10:05, 2025-05-05 16:05, 2025-05-05 22:05, 2025-05-06 04:05, 2025-05-06 10:05, 2025-05-06 16:05, 2025-05-06 22:05, 2025-05-07 04:05
Blocklist.net.ua
39.105.42.225 is listed on the Blocklist.net.ua blacklist.

Description: BlockList contains IP addresses that perform attacks,<br>send spam or brute force passwords to the blocking list.
Type of feed: primary (feed detail page)

Last checked at: 2025-05-06 02:15:02.478000
Was present on blacklist at: 2025-05-03 22:15, 2025-05-04 02:15, 2025-05-04 06:15, 2025-05-04 10:15, 2025-05-04 14:15, 2025-05-04 18:15, 2025-05-05 06:15, 2025-05-05 10:15, 2025-05-05 14:15, 2025-05-05 18:15, 2025-05-05 22:15, 2025-05-06 02:15
DataPlane SSH login
39.105.42.225 is listed on the DataPlane SSH login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login to a host using SSH password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2025-05-07 18:10:06.578000
Was present on blacklist at: 2025-05-04 02:10, 2025-05-04 06:10, 2025-05-04 10:10, 2025-05-04 14:10, 2025-05-04 18:10, 2025-05-04 22:10, 2025-05-05 02:10, 2025-05-05 06:10, 2025-05-05 10:10, 2025-05-05 14:10, 2025-05-05 18:10, 2025-05-05 22:10, 2025-05-06 02:10, 2025-05-06 06:10, 2025-05-06 10:10, 2025-05-06 14:10, 2025-05-06 18:10, 2025-05-06 22:10, 2025-05-07 02:10, 2025-05-07 06:10, 2025-05-07 10:10, 2025-05-07 14:10, 2025-05-07 18:10
CI Army
39.105.42.225 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2025-05-07 02:50:00.971000
Was present on blacklist at: 2025-05-04 02:50, 2025-05-05 02:50, 2025-05-06 02:50, 2025-05-07 02:50
DataPlane TELNET login
39.105.42.225 is listed on the DataPlane TELNET login blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs trying<br>an unsolicited login via TELNET password authentication.
Type of feed: primary (feed detail page)

Last checked at: 2025-05-07 18:10:02.664000
Was present on blacklist at: 2025-05-04 02:10, 2025-05-04 06:10, 2025-05-04 14:10, 2025-05-04 18:10, 2025-05-05 02:10, 2025-05-05 06:10, 2025-05-05 14:10, 2025-05-05 18:10, 2025-05-06 02:10, 2025-05-06 06:10, 2025-05-06 14:10, 2025-05-06 18:10, 2025-05-07 02:10, 2025-05-07 06:10, 2025-05-07 14:10, 2025-05-07 18:10
AbuseIPDB
39.105.42.225 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-05-07 04:00:00.578000
Was present on blacklist at: 2025-05-04 04:00, 2025-05-05 04:00, 2025-05-06 04:00, 2025-05-07 04:00
Turris greylist
39.105.42.225 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-05-06 21:15:00.171000
Was present on blacklist at: 2025-05-04 21:15, 2025-05-05 21:15, 2025-05-06 21:15
Warden events (48739)
2025-05-07
IntrusionUserCompromise (node.cfb4f7): 3494
2025-05-06
IntrusionUserCompromise (node.cfb4f7): 18332
2025-05-05
IntrusionUserCompromise (node.cfb4f7): 13202
2025-05-04
IntrusionUserCompromise (node.cfb4f7): 5153
2025-05-03
IntrusionUserCompromise (node.cfb4f7): 8556
AttemptLogin (node.ce2b59): 2
DShield reports (IP summary, reports)
2025-05-03
Number of reports: 48
Distinct targets: 30
2025-05-04
Number of reports: 117
Distinct targets: 68
2025-05-05
Number of reports: 189
Distinct targets: 85
2025-05-06
Number of reports: 188
Distinct targets: 90
OTX pulses
[5a7e3e70c44e7b48947593a7] 2018-02-10 00:36:00.396000 | Webscanners 2018-02-09 thru current day
Author name:david3
Pulse modified:2025-05-07 15:55:25.126000
Indicator created:2025-05-03 14:15:27
Indicator role:scanning_host
Indicator title:404 NOT FOUND
Indicator expiration:2025-08-01 00:00:00
Origin AS
AS37963 - CNNIC-ALIBABA-CN-NET-AP
BGP Prefix
39.104.0.0/15
geo
China, Beijing
🕑 Asia/Shanghai
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
39.104.0.0 - 39.107.255.255
last_activity
2025-05-07 16:33:17.232000
last_warden_event
2025-05-07 01:42:56
rep
0.3095238095238095
reserved_range
0
Shodan's InternetDB
Open ports: 1, 13, 15, 19, 22, 23, 25, 43, 53, 111, 113, 221, 441, 452, 480, 515, 789, 811, 853, 1099, 1599, 1801, 1926, 1974, 2003, 2031, 2063, 2069, 2095, 2109, 2121, 2133, 2154, 2222, 2327, 2376, 2404, 2628, 2762, 2995, 3050, 3176, 3256, 3310, 3389, 3408, 3531, 3780, 4000, 4242, 4344, 4369, 4437, 4543, 5010, 5093, 5568, 5569, 5696, 5938, 6002, 6021, 6379, 6443, 6668, 6755, 6887, 6955, 7001, 7218, 7325, 7480, 7535, 7548, 8009, 8028, 8048, 8055, 8061, 8073, 8230, 8243, 8291, 8384, 8402, 8422, 8443, 8448, 8451, 8461, 8500, 8533, 8575, 8584, 8649, 8771, 8812, 8818, 8845, 9028, 9031, 9045, 9065, 9082, 9092, 9153, 9199, 9212, 9248, 9306, 9433, 9446, 9458, 9553, 9600, 9674, 9682, 9761, 9803, 9888, 9999, 10010, 10201, 10210, 10255, 10911, 11288, 12109, 12112, 12245, 12274, 12290, 12306, 12312, 12342, 12368, 12391, 12401, 12425, 12437, 12478, 12508, 12561, 13047, 14905, 15443, 16003, 16075, 16081, 16993, 17000, 18025, 18046, 18057, 18066, 18080, 18084, 19200, 19930, 20087, 20151, 20256, 20547, 21025, 21083, 21235, 21277, 21303, 21322, 21379, 21935, 23023, 24082, 25565, 26656, 27015, 27017, 28015, 30301, 30422, 30922, 31210, 31337, 31622, 32422, 32444, 32722, 33338, 38333, 41443, 41800, 49767, 50000, 50100, 50113, 51235, 51434, 53482, 54138, 57786, 58585, 60000, 61613, 62016, 63210, 63256, 63260
Tags: honeypot, proxy, eol-product
CPEs: cpe:/a:openbsd:openssh:6.6.1p1, cpe:/a:openbsd:openssh:8.2p1, cpe:/a:openbsd:openssh:7.5, cpe:/o:hp:hp-ux, cpe:/a:f5:nginx:1.22.1, cpe:/a:openbsd:openssh:7.4, cpe:/a:openbsd:openssh:7.6p1, cpe:/a:f5:nginx, cpe:/a:openbsd:openssh:8.0, cpe:/a:microsoft:internet_information_services, cpe:/o:microsoft:windows, cpe:/o:canonical:ubuntu_linux, cpe:/a:apache:subversion, cpe:/a:openbsd:openssh:5.3, cpe:/a:openbsd:openssh:6.6.1, cpe:/a:microsoft:message_queuing
ts_added
2025-05-03 13:00:34.100000
ts_last_update
2025-05-07 18:53:24.841000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses