IP address


.39520.14.90.84
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
CI Army
20.14.90.84 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2025-05-04 02:50:01.123000
Was present on blacklist at: 2025-04-27 02:50, 2025-04-28 02:50, 2025-04-29 02:50, 2025-04-30 02:50, 2025-05-01 02:50, 2025-05-02 02:50, 2025-05-03 02:50, 2025-05-04 02:50
AbuseIPDB
20.14.90.84 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-04-30 04:00:00.787000
Was present on blacklist at: 2025-04-29 04:00, 2025-04-30 04:00
Turris greylist
20.14.90.84 is listed on the Turris greylist blacklist.

Description: Greylist is the output of the Turris research project by CZ.NIC,<br>which collects data of malicious IPs.
Type of feed: primary (feed detail page)

Last checked at: 2025-05-02 21:15:00.201000
Was present on blacklist at: 2025-04-30 21:15, 2025-05-02 21:15
DataPlane SIP query
20.14.90.84 is listed on the DataPlane SIP query blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IP addresses that<br>has been seen initiating an unsolicited SIP OPTIONS query to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2025-05-04 06:10:01.208000
Was present on blacklist at: 2025-05-02 14:10, 2025-05-02 18:10, 2025-05-03 02:10, 2025-05-03 06:10, 2025-05-03 14:10, 2025-05-03 18:10, 2025-05-04 02:10, 2025-05-04 06:10
Spamhaus XBL CBL
20.14.90.84 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-05-04 02:18:51.611000
Was present on blacklist at: 2025-05-04 02:18
Warden events (28)
2025-05-04
ReconScanning (node.368407): 1
2025-05-03
ReconScanning (node.368407): 2
2025-05-02
ReconScanning (node.368407): 3
ReconScanning (node.4dc198): 4
2025-05-01
ReconScanning (node.368407): 1
2025-04-30
ReconScanning (node.368407): 2
ReconScanning (node.4dc198): 2
2025-04-29
ReconScanning (node.368407): 2
2025-04-28
ReconScanning (node.368407): 3
ReconScanning (node.4dc198): 2
2025-04-27
ReconScanning (node.4dc198): 3
ReconScanning (node.368407): 3
DShield reports (IP summary, reports)
2025-04-26
Number of reports: 36
Distinct targets: 31
2025-04-27
Number of reports: 91
Distinct targets: 67
2025-04-28
Number of reports: 121
Distinct targets: 76
2025-04-29
Number of reports: 64
Distinct targets: 56
2025-04-30
Number of reports: 101
Distinct targets: 66
2025-05-01
Number of reports: 83
Distinct targets: 48
2025-05-02
Number of reports: 78
Distinct targets: 43
2025-05-03
Number of reports: 47
Distinct targets: 42
Origin AS
AS8075 - MICROSOFT-CORP-MSN-AS-BLOCK
BGP Prefix
20.0.0.0/11
geo
United States, Phoenix
🕑 America/Phoenix
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
20.0.0.0 - 20.31.255.255
last_activity
2025-05-04 10:32:00
last_warden_event
2025-05-04 10:32:00
rep
0.39468005952380947
reserved_range
0
ts_added
2025-04-27 02:18:42.035000
ts_last_update
2025-05-04 10:32:08.300000

Warden event timeline

DShield event timeline

Presence on blacklists