IP address


--45.137.70.105105.70.137.45.in-addr.arpa
Shodan(more info)
Passive DNS
Tags: IP in hostname
IP blacklists
AbuseIPDB
45.137.70.105 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-04-17 04:00:00.753000
Was present on blacklist at: 2025-04-17 04:00
Spamhaus XBL CBL
45.137.70.105 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-06-26 04:01:55.648000
Was present on blacklist at: 2025-04-17 04:01, 2025-04-24 04:01, 2025-05-01 04:01, 2025-05-08 04:02, 2025-05-15 04:01
Blocklist.net.ua
45.137.70.105 is listed on the Blocklist.net.ua blacklist.

Description: BlockList contains IP addresses that perform attacks,<br>send spam or brute force passwords to the blocking list.
Type of feed: primary (feed detail page)

Last checked at: 2025-04-29 14:15:02.588000
Was present on blacklist at: 2025-04-20 02:15, 2025-04-20 06:15, 2025-04-20 10:15, 2025-04-20 14:15, 2025-04-20 18:15, 2025-04-20 22:15, 2025-04-28 18:15, 2025-04-28 22:15, 2025-04-29 02:15, 2025-04-29 06:15, 2025-04-29 10:15, 2025-04-29 14:15
Turris greylist
45.137.70.105 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-05-04 21:15:00.216000
Was present on blacklist at: 2025-04-24 21:15, 2025-04-29 21:15, 2025-04-30 21:15, 2025-05-04 21:15
blocklist.de SSH
45.137.70.105 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2025-04-30 16:05:00.659000
Was present on blacklist at: 2025-04-28 16:05, 2025-04-28 22:05, 2025-04-29 04:05, 2025-04-29 10:05, 2025-04-29 22:05, 2025-04-30 04:05, 2025-04-30 10:05, 2025-04-30 16:05
DShield reports (IP summary, reports)
2025-04-16
Number of reports: 36
Distinct targets: 6
OTX pulses
[5a7e3e70c44e7b48947593a7] 2018-02-10 00:36:00.396000 | Webscanners 2018-02-09 thru current day
Author name:david3
Pulse modified:2025-05-28 19:45:17.307000
Indicator created:2025-04-28 23:25:26
Indicator role:scanning_host
Indicator title:404 NOT FOUND
Indicator expiration:2025-07-27 00:00:00
Origin AS
AS203446 - AS203446
BGP Prefix
45.137.70.0/24
geo
Germany
🕑 Europe/Berlin
hostname
105.70.137.45.in-addr.arpa
hostname_class
['ip_in_hostname']
Address block ('inetnum' or 'NetRange' in whois database)
45.137.68.0 - 45.137.71.255
last_activity
2025-05-28 20:00:53.990000
reserved_range
0
Shodan's InternetDB
Open ports: 137, 3389, 5357, 5985
Tags: self-signed
CPEs:
ts_added
2025-04-17 04:01:40.568000
ts_last_update
2025-06-26 04:01:56.213000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses