Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chicago

Region: Illinois

Country: United States

Internet Service Provider: SingleHop LLC

Hostname: unknown

Organization: SingleHop LLC

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
 TCP (SYN) 198.20.70.114:27153 -> port 992, len 44
2020-10-09 07:08:34
attackspam
Honeypot hit.
2020-10-08 23:34:56
attack
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-08 15:31:10
attackspambots
Automatic report - Banned IP Access
2020-09-02 20:59:15
attackbots
Hit honeypot r.
2020-09-02 12:53:37
attackbotsspam
srv02 Mass scanning activity detected Target: 9999  ..
2020-09-02 05:58:31
attackbots
Unauthorized connection attempt detected from IP address 198.20.70.114 to port 2762
2020-07-22 22:10:39
attackbots
Automatic report - Banned IP Access
2020-07-15 06:59:31
attackbots
Unauthorized connection attempt detected from IP address 198.20.70.114 to port 11
2020-07-12 12:35:51
attack
Unauthorized connection attempt detected from IP address 198.20.70.114 to port 2404
2020-05-31 23:13:39
attack
Unauthorized connection attempt detected from IP address 198.20.70.114 to port 1471
2020-05-21 00:40:26
attackbots
Unauthorized connection attempt detected from IP address 198.20.70.114 to port 3749
2020-05-12 18:09:15
attackspambots
Unauthorized connection attempt detected from IP address 198.20.70.114 to port 5601
2020-05-07 01:44:27
attackbotsspam
" "
2020-04-16 08:19:09
attackbots
3386/udp 8545/tcp 4369/tcp...
[2020-03-15/27]25pkt,22pt.(tcp),3pt.(udp)
2020-03-29 06:42:26
attack
Port scan: Attack repeated for 24 hours
2020-03-21 05:50:24
attackbotsspam
2019-09-17 10:39:52 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=census3.shodan.io \[198.20.70.114\]:55488 I=\[193.107.90.29\]:25 input="\026\003\001\001E\001"
2019-09-17 10:39:54 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=census3.shodan.io \[198.20.70.114\]:55854 I=\[193.107.90.29\]:25 input="\026\003\001"
2019-09-17 10:39:54 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=census3.shodan.io \[198.20.70.114\]:55890 I=\[193.107.90.29\]:25 input="\026\003\001"
...
2020-01-30 03:15:27
attack
port scan and connect, tcp 8443 (https-alt)
2019-12-03 19:15:02
attack
Fail2Ban Ban Triggered
2019-11-30 04:38:09
attack
198.20.70.114 was recorded 10 times by 8 hosts attempting to connect to the following ports: 102,110,18245,2345,9160,9090,789,8834,8126,4730. Incident counter (4h, 24h, all-time): 10, 34, 767
2019-11-27 00:57:32
attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-18 15:07:52
attackbots
198.20.70.114 was recorded 5 times by 5 hosts attempting to connect to the following ports: 8008,1962,32400,41794,19. Incident counter (4h, 24h, all-time): 5, 32, 139
2019-11-09 07:41:20
attackspambots
Automatic report - Port Scan Attack
2019-10-04 14:34:58
attackbots
3389BruteforceStormFW23
2019-08-15 05:59:04
attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-07-08 01:08:39
attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=16455)(07061040)
2019-07-06 18:25:01
attack
Port scan: Attack repeated for 24 hours
2019-06-30 00:12:28
attackspambots
SIP brute force
2019-06-26 11:24:59
attackbotsspam
23.06.2019 15:31:39 Connection to port 25105 blocked by firewall
2019-06-24 00:25:24
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.20.70.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20350
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;198.20.70.114.			IN	A

;; AUTHORITY SECTION:
.			3192	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019033000 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Mar 30 20:19:05 +08 2019
;; MSG SIZE  rcvd: 117

Host info
114.70.20.198.in-addr.arpa domain name pointer census3.shodan.io.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
114.70.20.198.in-addr.arpa	name = census3.shodan.io.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
90.221.38.98 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-06-04 04:16:34
218.75.98.230 attackspambots
Unauthorized connection attempt from IP address 218.75.98.230 on Port 445(SMB)
2020-06-04 04:33:05
198.199.104.196 attackbotsspam
Bruteforce detected by fail2ban
2020-06-04 03:57:20
222.186.15.62 attackbotsspam
Jun  3 22:21:01 vps sshd[1045402]: Failed password for root from 222.186.15.62 port 10295 ssh2
Jun  3 22:21:04 vps sshd[1045402]: Failed password for root from 222.186.15.62 port 10295 ssh2
Jun  3 22:21:06 vps sshd[1046085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Jun  3 22:21:07 vps sshd[1046085]: Failed password for root from 222.186.15.62 port 46906 ssh2
Jun  3 22:21:10 vps sshd[1046085]: Failed password for root from 222.186.15.62 port 46906 ssh2
...
2020-06-04 04:23:01
218.92.0.171 attackbotsspam
2020-06-03T20:10:34.851901shield sshd\[5939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
2020-06-03T20:10:36.018286shield sshd\[5939\]: Failed password for root from 218.92.0.171 port 4295 ssh2
2020-06-03T20:10:39.509401shield sshd\[5939\]: Failed password for root from 218.92.0.171 port 4295 ssh2
2020-06-03T20:10:42.742835shield sshd\[5939\]: Failed password for root from 218.92.0.171 port 4295 ssh2
2020-06-03T20:10:46.389787shield sshd\[5939\]: Failed password for root from 218.92.0.171 port 4295 ssh2
2020-06-04 04:15:30
115.215.123.252 attackspam
Lines containing failures of 115.215.123.252
Jun  1 00:53:35 ghostnameioc sshd[30994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.215.123.252  user=r.r
Jun  1 00:53:37 ghostnameioc sshd[30994]: Failed password for r.r from 115.215.123.252 port 53549 ssh2
Jun  1 00:53:39 ghostnameioc sshd[30994]: Received disconnect from 115.215.123.252 port 53549:11: Bye Bye [preauth]
Jun  1 00:53:39 ghostnameioc sshd[30994]: Disconnected from authenticating user r.r 115.215.123.252 port 53549 [preauth]
Jun  1 00:56:58 ghostnameioc sshd[31081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.215.123.252  user=r.r
Jun  1 00:57:00 ghostnameioc sshd[31081]: Failed password for r.r from 115.215.123.252 port 53414 ssh2
Jun  1 00:57:02 ghostnameioc sshd[31081]: Received disconnect from 115.215.123.252 port 53414:11: Bye Bye [preauth]
Jun  1 00:57:02 ghostnameioc sshd[31081]: Disconnected from authentic........
------------------------------
2020-06-04 04:03:35
31.181.43.222 attackbots
IP 31.181.43.222 attacked honeypot on port: 8080 at 6/3/2020 12:46:34 PM
2020-06-04 04:09:38
67.205.135.65 attack
Jun  3 21:55:21 DAAP sshd[2334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.65  user=root
Jun  3 21:55:23 DAAP sshd[2334]: Failed password for root from 67.205.135.65 port 43590 ssh2
Jun  3 21:58:29 DAAP sshd[2422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.65  user=root
Jun  3 21:58:31 DAAP sshd[2422]: Failed password for root from 67.205.135.65 port 38878 ssh2
Jun  3 22:00:41 DAAP sshd[2491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.65  user=root
Jun  3 22:00:43 DAAP sshd[2491]: Failed password for root from 67.205.135.65 port 53360 ssh2
...
2020-06-04 04:13:49
182.18.252.168 attackspambots
k+ssh-bruteforce
2020-06-04 04:06:42
119.27.161.171 attack
Jun  3 22:15:36 fhem-rasp sshd[19759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.161.171  user=root
Jun  3 22:15:38 fhem-rasp sshd[19759]: Failed password for root from 119.27.161.171 port 44718 ssh2
...
2020-06-04 04:34:47
37.49.224.162 attackspam
Jun  3 22:15:18 jane sshd[20520]: Failed password for root from 37.49.224.162 port 36562 ssh2
...
2020-06-04 04:18:11
222.186.180.41 attack
Jun  3 22:13:26 server sshd[38875]: Failed none for root from 222.186.180.41 port 14386 ssh2
Jun  3 22:13:28 server sshd[38875]: Failed password for root from 222.186.180.41 port 14386 ssh2
Jun  3 22:13:32 server sshd[38875]: Failed password for root from 222.186.180.41 port 14386 ssh2
2020-06-04 04:14:55
220.122.65.160 attackspambots
xmlrpc attack
2020-06-04 04:25:12
116.196.73.159 attack
Jun  3 15:29:39 home sshd[24947]: Failed password for root from 116.196.73.159 port 35854 ssh2
Jun  3 15:33:42 home sshd[25350]: Failed password for root from 116.196.73.159 port 59214 ssh2
...
2020-06-04 03:58:36
181.176.181.13 attackbotsspam
...
2020-06-04 03:57:58

Recently Reported IPs

104.248.252.176 148.70.1.210 14.161.37.67 201.145.155.110
13.107.21.200 118.99.100.2 115.236.61.204 202.51.255.156
106.77.187.147 87.236.212.223 45.55.88.94 156.202.56.28
118.126.105.120 182.61.49.179 124.194.44.219 186.96.66.58
81.22.45.206 203.113.66.151 181.40.40.118 123.30.149.40