IP address


.54820.168.120.227
Shodan(more info)
Passive DNS
Tags: Scanner
IP blacklists
CI Army
20.168.120.227 is listed on the CI Army blacklist.

Description: Collective Intelligence Network Security is a Threat Intelligence<br>database that provides scores for IPs. Source of unspecified malicious attacks<br>most of them will be active attackers/scanners
Type of feed: primary (feed detail page)

Last checked at: 2025-05-03 02:50:00.870000
Was present on blacklist at: 2025-04-27 02:50, 2025-04-28 02:50, 2025-04-29 02:50, 2025-04-30 02:50, 2025-05-01 02:50, 2025-05-02 02:50, 2025-05-03 02:50
DataPlane SMTP greeting
20.168.120.227 is listed on the DataPlane SMTP greeting blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IPs that are<br>identified as SMTP clients issuing unsolicited HELO or EHLO commands.
Type of feed: primary (feed detail page)

Last checked at: 2025-05-03 14:10:06.003000
Was present on blacklist at: 2025-04-29 10:10, 2025-04-29 14:10, 2025-04-29 18:10, 2025-04-29 22:10, 2025-04-30 02:10, 2025-04-30 06:10, 2025-04-30 10:10, 2025-04-30 14:10, 2025-04-30 18:10, 2025-04-30 22:10, 2025-05-01 02:10, 2025-05-01 06:10, 2025-05-01 10:10, 2025-05-01 14:10, 2025-05-01 18:10, 2025-05-01 22:10, 2025-05-02 02:10, 2025-05-02 06:10, 2025-05-02 10:10, 2025-05-02 14:10, 2025-05-02 18:10, 2025-05-02 22:10, 2025-05-03 02:10, 2025-05-03 06:10, 2025-05-03 10:10, 2025-05-03 14:10
AbuseIPDB
20.168.120.227 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2025-05-03 04:00:00.690000
Was present on blacklist at: 2025-04-30 04:00, 2025-05-01 04:00, 2025-05-03 04:00
Spamhaus XBL CBL
20.168.120.227 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2025-05-03 12:35:10.059000
Was present on blacklist at: 2025-05-03 12:35
Warden events (39)
2025-05-03
ReconScanning (node.4dc198): 2
2025-05-02
ReconScanning (node.368407): 4
ReconScanning (node.4dc198): 1
2025-05-01
ReconScanning (node.4dc198): 1
ReconScanning (node.368407): 2
2025-04-30
ReconScanning (node.4dc198): 2
ReconScanning (node.368407): 5
2025-04-29
ReconScanning (node.4dc198): 5
ReconScanning (node.368407): 1
2025-04-28
ReconScanning (node.368407): 2
ReconScanning (node.4dc198): 2
ReconScanning (node.06f8e8): 1
ReconScanning (node.90bbae): 1
ReconScanning (node.310b2f): 1
ReconScanning (node.5f02e7): 1
2025-04-27
ReconScanning (node.368407): 3
ReconScanning (node.4dc198): 1
2025-04-26
ReconScanning (node.368407): 2
ReconScanning (node.4dc198): 2
DShield reports (IP summary, reports)
2025-04-26
Number of reports: 51
Distinct targets: 26
2025-04-27
Number of reports: 85
Distinct targets: 62
2025-04-28
Number of reports: 104
Distinct targets: 68
2025-04-29
Number of reports: 66
Distinct targets: 50
2025-04-30
Number of reports: 66
Distinct targets: 41
2025-05-01
Number of reports: 102
Distinct targets: 54
2025-05-02
Number of reports: 100
Distinct targets: 71
Origin AS
AS8075 - MICROSOFT-CORP-MSN-AS-BLOCK
BGP Prefix
20.160.0.0/12
geo
United States, Phoenix
🕑 America/Phoenix
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
20.160.0.0 - 20.175.255.255
last_activity
2025-05-03 12:20:36
last_warden_event
2025-05-03 12:20:36
rep
0.54771728515625
reserved_range
0
ts_added
2025-04-26 12:35:00.660000
ts_last_update
2025-05-03 14:21:08.129000

Warden event timeline

DShield event timeline

Presence on blacklists