86.185.70.138

United Kingdom

0

Resolved hostnames

0

Contacting malwares

0

Online malicious URLs allocated

0

Offline malicious URLs allocated

Current activity of this IP:


Known Attacker

This IP Address has been seen sending attacks over the Internet.


Blacklist timeline


First seen: Wed Jan 13 2021 19:44:06 GMT+0000
Last seen: Wed Jul 02 2025 21:45:59 GMT+0000
Period: 4 years

Whois information


Autonomous System
AS Name:
AS2856 Ip Pools
AS Country Code:
GB (United Kingdom)
AS Registry:
ripencc
AS Date:
Mon Feb 07 2005 00:00:00 GMT+0000
AS CIDR:
86.128.0.0/10

Registrant information
Registrant name:
Ip Pools
Postal Code:
AB43 9HP
Country Code:
GB (United Kingdom)
City:
Fraserburgh

Dates
Indexed:
Sat Dec 05 2020 08:41:17 GMT+0000
Last modified:
Wed Jul 02 2025 21:46:01 GMT+0000
AS Date:
Mon Feb 07 2005 00:00:00 GMT+0000

Location - Fraserburgh - United Kingdom


Developers can check API Specification here:


Request:

          
curl -H "Authorization: Bearer <API_KEY>" https://api.maltiverse.com/ip/86.185.70.138
        

Request:

Alternatively you can use Maltiverse Python3 Library:
          
import requests
import json

url = 'https://api.maltiverse.com/ip/86.185.70.138'
response = requests.get(url)
print(json.dumps(response.json(), indent=4, sort_keys=True))
        

Request:

          
$url = 'https://api.maltiverse.com/ip/86.185.70.138'
$headers =  @{Authorization=("Bearer {0}" -f "<API_KEY>")}
$response = Invoke-RestMethod $url -Headers $headers
Write-Output $response
        

Response:

      
{
    "as_name": "AS2856 Ip Pools",
    "as_number": "2856",
    "asn_cidr": "86.128.0.0/10",
    "asn_country_code": "GB",
    "asn_date": "2005-02-07 00:00:00",
    "asn_registry": "ripencc",
    "blacklist": [
        {
            "count": 3,
            "description": "Mail Spammer",
            "first_seen": "2021-01-13 19:44:06",
            "last_seen": "2025-07-02 21:45:59",
            "source": "Barracuda"
        },
        {
            "count": 4,
            "description": "SIP Attacker",
            "first_seen": "2020-12-22 23:53:28",
            "labels": [
                "malicious-activity"
            ],
            "last_seen": "2021-01-15 09:46:40",
            "source": "Blocklist.de"
        },
        {
            "count": 2,
            "description": "SSH Attacker",
            "first_seen": "2020-12-05 08:41:17",
            "labels": [
                "malicious-activity"
            ],
            "last_seen": "2020-12-22 08:55:37",
            "source": "Blocklist.de"
        },
        {
            "count": 2,
            "description": "Brute force passwords using SSH on server S1-RU",
            "first_seen": "2020-12-19 08:33:28",
            "labels": [
                "malicious-activity"
            ],
            "last_seen": "2020-12-19 22:00:05",
            "source": "Blocklist.net.ua"
        },
        {
            "count": 2,
            "description": "Malicious Host",
            "first_seen": "2020-12-06 00:00:00",
            "last_seen": "2020-12-19 00:00:00",
            "source": "HoneyDB"
        },
        {
            "count": 2,
            "description": "Malicious host",
            "first_seen": "2020-12-13 13:47:41",
            "labels": [
                "malicious-activity"
            ],
            "last_seen": "2020-12-18 11:01:20",
            "source": "Darklist"
        }
    ],
    "city": "Fraserburgh",
    "classification": "malicious",
    "country_code": "GB",
    "creation_time": "2020-12-05 08:41:17",
    "ip_addr": "86.185.70.138",
    "ip_version": 4,
    "is_cdn": false,
    "is_cnc": false,
    "is_distributing_malware": false,
    "is_hosting": false,
    "is_iot_threat": false,
    "is_known_attacker": true,
    "is_known_scanner": false,
    "is_mining_pool": false,
    "is_open_proxy": false,
    "is_sinkhole": false,
    "is_tor_node": false,
    "is_vpn_node": false,
    "location": {
        "lat": 57.589764,
        "lon": -2.096076
    },
    "modification_time": "2025-07-02 21:46:01",
    "number_of_blacklisted_domains_resolving": 0,
    "number_of_domains_resolving": 0,
    "number_of_offline_malicious_urls_allocated": 0,
    "number_of_online_malicious_urls_allocated": 0,
    "number_of_whitelisted_domains_resolving": 0,
    "postal_code": "AB43 9HP",
    "registrant_name": "Ip Pools",
    "scoring_executed_time": "2025-07-02 21:46:01",
    "tag": [
        "ssh",
        "bruteforce",
        "bot",
        "apache",
        "attacker",
        "script kiddies",
        "abuse",
        "sip"
    ],
    "type": "ip"
}