IP address


.00050.116.63.67www.pt-boat.com
Shodan(more info)
Passive DNS
Tags:
IP blacklists
CI Army
50.116.63.67 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2025-02-18 03:50:01.487000
Was present on blacklist at: 2025-01-29 03:50, 2025-01-30 03:50, 2025-02-02 03:50, 2025-02-03 03:50, 2025-02-07 03:50, 2025-02-08 03:50, 2025-02-09 03:50, 2025-02-10 03:50, 2025-02-11 03:50, 2025-02-12 03:50, 2025-02-13 03:50, 2025-02-14 03:50, 2025-02-15 03:50, 2025-02-16 03:50, 2025-02-17 03:50, 2025-02-18 03:50
Spamhaus XBL CBL
50.116.63.67 was recently listed on the Spamhaus XBL CBL blacklist, but currently it is not.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-04-23 05:18:50.272000
Was present on blacklist at: 2025-02-05 05:22, 2025-02-12 05:22, 2025-03-05 05:20
Turris greylist
50.116.63.67 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-02-08 22:15:00.157000
Was present on blacklist at: 2025-02-04 22:15, 2025-02-05 22:15, 2025-02-08 22:15
Blocklist.net.ua
50.116.63.67 is listed on the Blocklist.net.ua blacklist.

Description: BlockList contains IP addresses that perform attacks,<br>send spam or brute force passwords to the blocking list.
Type of feed: primary (feed detail page)

Last checked at: 2025-02-07 23:15:01.612000
Was present on blacklist at: 2025-01-28 07:15, 2025-01-28 11:15, 2025-01-28 15:15, 2025-01-28 19:15, 2025-01-28 23:15, 2025-01-29 03:15, 2025-01-29 07:15, 2025-01-29 11:15, 2025-01-29 15:15, 2025-01-29 19:15, 2025-01-29 23:15, 2025-01-30 03:15, 2025-01-30 07:15, 2025-01-30 11:15, 2025-01-30 15:15, 2025-01-30 19:15, 2025-01-30 23:15, 2025-01-31 03:15, 2025-01-31 07:15, 2025-01-31 11:15, 2025-01-31 15:15, 2025-01-31 19:15, 2025-01-31 23:15, 2025-02-01 03:15, 2025-02-01 07:15, 2025-02-01 11:15, 2025-02-01 15:15, 2025-02-01 19:15, 2025-02-01 23:15, 2025-02-02 03:15, 2025-02-02 07:15, 2025-02-02 11:15, 2025-02-02 15:15, 2025-02-02 19:15, 2025-02-02 23:15, 2025-02-03 03:15, 2025-02-03 07:15, 2025-02-03 11:15, 2025-02-03 15:15, 2025-02-03 19:15, 2025-02-03 23:15, 2025-02-04 03:15, 2025-02-04 07:15, 2025-02-04 11:15, 2025-02-04 15:15, 2025-02-04 19:15, 2025-02-04 23:15, 2025-02-05 03:15, 2025-02-05 07:15, 2025-02-05 11:15, 2025-02-05 15:15, 2025-02-05 19:15, 2025-02-05 23:15, 2025-02-06 03:15, 2025-02-06 07:15, 2025-02-06 11:15, 2025-02-06 15:15, 2025-02-06 19:15, 2025-02-06 23:15, 2025-02-07 03:15, 2025-02-07 07:15, 2025-02-07 11:15, 2025-02-07 15:15, 2025-02-07 19:15, 2025-02-07 23:15
AbuseIPDB
50.116.63.67 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-02-15 05:00:00.495000
Was present on blacklist at: 2025-02-15 05:00
DataPlane VNC RFB
50.116.63.67 is listed on the DataPlane VNC RFB blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs initiating<br>an unsolicited VNC remote frame buffer (RFB) session to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2025-02-22 11:10:00.896000
Was present on blacklist at: 2025-02-15 15:10, 2025-02-15 19:10, 2025-02-15 23:10, 2025-02-16 03:10, 2025-02-16 07:10, 2025-02-16 11:10, 2025-02-16 15:10, 2025-02-16 19:10, 2025-02-16 23:10, 2025-02-17 03:10, 2025-02-17 07:10, 2025-02-17 11:10, 2025-02-17 15:10, 2025-02-17 19:10, 2025-02-17 23:10, 2025-02-18 03:10, 2025-02-18 07:10, 2025-02-18 11:10, 2025-02-18 15:10, 2025-02-18 19:10, 2025-02-18 23:10, 2025-02-19 03:10, 2025-02-19 07:10, 2025-02-19 11:10, 2025-02-19 15:10, 2025-02-19 19:10, 2025-02-19 23:10, 2025-02-20 03:10, 2025-02-20 07:10, 2025-02-20 11:10, 2025-02-20 15:10, 2025-02-20 19:10, 2025-02-20 23:10, 2025-02-21 03:10, 2025-02-21 07:10, 2025-02-21 11:10, 2025-02-21 15:10, 2025-02-21 19:10, 2025-02-21 23:10, 2025-02-22 03:10, 2025-02-22 07:10, 2025-02-22 11:10
DataPlane SMTP greeting
50.116.63.67 is listed on the DataPlane SMTP greeting blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs that are<br>identified as SMTP clients issuing unsolicited HELO or EHLO commands.
Type of feed: primary (feed detail page)

Last checked at: 2025-03-01 23:10:02.338000
Was present on blacklist at: 2025-02-22 19:10, 2025-02-22 23:10, 2025-02-23 03:10, 2025-02-23 07:10, 2025-02-23 11:10, 2025-02-23 15:10, 2025-02-23 19:10, 2025-02-23 23:10, 2025-02-24 03:10, 2025-02-24 07:10, 2025-02-24 11:10, 2025-02-24 15:10, 2025-02-24 19:10, 2025-02-24 23:10, 2025-02-25 03:10, 2025-02-25 07:10, 2025-02-25 11:10, 2025-02-25 15:10, 2025-02-25 19:10, 2025-02-25 23:10, 2025-02-26 03:10, 2025-02-26 07:10, 2025-02-26 11:10, 2025-02-26 15:10, 2025-02-26 19:10, 2025-02-26 23:10, 2025-02-27 03:10, 2025-02-27 07:10, 2025-02-27 11:10, 2025-02-27 15:10, 2025-02-27 19:10, 2025-02-27 23:10, 2025-02-28 03:10, 2025-02-28 07:10, 2025-02-28 11:10, 2025-02-28 15:10, 2025-02-28 19:10, 2025-02-28 23:10, 2025-03-01 03:10, 2025-03-01 07:10, 2025-03-01 11:10, 2025-03-01 15:10, 2025-03-01 19:10, 2025-03-01 23:10
Warden events (1)
2025-02-07
IntrusionUserCompromise (node.cfb4f7): 1
DShield reports (IP summary, reports)
2025-01-28
Number of reports: 16
Distinct targets: 6
2025-02-02
Number of reports: 12
Distinct targets: 3
2025-02-03
Number of reports: 15
Distinct targets: 3
2025-02-07
Number of reports: 95
Distinct targets: 12
2025-02-08
Number of reports: 19
Distinct targets: 10
2025-02-10
Number of reports: 42
Distinct targets: 22
2025-02-11
Number of reports: 12
Distinct targets: 10
2025-02-12
Number of reports: 47
Distinct targets: 30
2025-02-13
Number of reports: 88
Distinct targets: 35
2025-02-14
Number of reports: 75
Distinct targets: 49
2025-02-15
Number of reports: 32
Distinct targets: 21
2025-02-16
Number of reports: 45
Distinct targets: 31
2025-02-17
Number of reports: 41
Distinct targets: 29
2025-02-22
Number of reports: 92
Distinct targets: 48
OTX pulses
[5a7e3e70c44e7b48947593a7] 2018-02-10 00:36:00.396000 | Webscanners 2018-02-09 thru current day
Author name:david3
Pulse modified:2025-02-03 23:55:20.529000
Indicator created:2025-01-05 01:15:16
Indicator role:scanning_host
Indicator title:404 NOT FOUND
Indicator expiration:2025-04-05 00:00:00
Origin AS
AS63949 - LINODE-AP
BGP Prefix
50.116.48.0/20
geo
United States, Cedar Knolls
🕑 America/New_York
hostname
www.pt-boat.com
Address block ('inetnum' or 'NetRange' in whois database)
50.116.0.0 - 50.116.63.255
last_activity
2025-02-07 16:33:58
last_warden_event
2025-02-07 16:33:58
rep
0.0
reserved_range
0
Shodan's InternetDB
Open ports: 22, 1194
Tags: scanner, vpn, cloud
CPEs: cpe:/o:canonical:ubuntu_linux, cpe:/a:openbsd:openssh:8.9p1
ts_added
2024-11-13 05:18:44.133000
ts_last_update
2025-04-28 05:20:42.087000

Warden event timeline

DShield event timeline

Presence on blacklists

OTX pulses