Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: Default Route LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
 TCP (SYN) 74.120.14.20:11807 -> port 82, len 44
2020-10-01 04:50:10
attackbots
 TCP (SYN) 74.120.14.20:56139 -> port 5900, len 44
2020-09-30 21:04:20
attack
Port scanning [4 denied]
2020-09-30 13:34:23
Comments on same subnet:
IP Type Details Datetime
74.120.14.29 attackbots
 TCP (SYN) 74.120.14.29:49585 -> port 995, len 44
2020-10-14 06:47:10
74.120.14.18 attack
 TCP (SYN) 74.120.14.18:63537 -> port 8080, len 44
2020-10-14 05:41:37
74.120.14.16 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 66 - port: 8089 proto: tcp cat: Misc Attackbytes: 60
2020-10-14 05:22:14
74.120.14.71 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 67 - port: 7070 proto: tcp cat: Misc Attackbytes: 60
2020-10-14 05:06:23
74.120.14.27 attackspambots
Port scan: Attack repeated for 24 hours
2020-10-14 03:44:00
74.120.14.74 attack
 TCP (SYN) 74.120.14.74:36705 -> port 5495, len 44
2020-10-13 22:38:32
74.120.14.16 attack
 TCP (SYN) 74.120.14.16:37330 -> port 25, len 44
2020-10-13 20:41:28
74.120.14.67 attackbots
9833/tcp 9718/tcp 18029/tcp...
[2020-09-14/10-13]192pkt,176pt.(tcp)
2020-10-13 20:41:03
74.120.14.27 attackspam
 TCP (SYN) 74.120.14.27:33289 -> port 2222, len 44
2020-10-13 19:03:33
74.120.14.74 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 65
2020-10-13 13:59:10
74.120.14.16 attack
spam
2020-10-13 12:13:05
74.120.14.67 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 65 - port: 8382 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 12:12:48
74.120.14.75 attackspam
 TCP (SYN) 74.120.14.75:2675 -> port 3010, len 44
2020-10-13 12:12:15
74.120.14.74 attackbots
 TCP (SYN) 74.120.14.74:24302 -> port 9845, len 44
2020-10-13 06:43:19
74.120.14.16 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 64 - port: 1194 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 05:02:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.120.14.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59952
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;74.120.14.20.			IN	A

;; AUTHORITY SECTION:
.			512	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020092901 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 30 13:34:13 CST 2020
;; MSG SIZE  rcvd: 116
Host info
20.14.120.74.in-addr.arpa domain name pointer scanner-02.ch1.censys-scanner.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.14.120.74.in-addr.arpa	name = scanner-02.ch1.censys-scanner.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.167.185.194 attackbotsspam
Invalid user ubnt from 200.167.185.194 port 56641
2019-07-28 04:52:17
58.124.24.126 attackbots
:
2019-07-28 05:08:54
46.105.244.17 attack
Invalid user sftpuser from 46.105.244.17 port 44008
2019-07-28 04:46:38
82.223.69.108 attack
Invalid user mpiuser from 82.223.69.108 port 41732
2019-07-28 04:44:41
206.189.65.11 attackbots
Jul 27 22:42:08 herz-der-gamer sshd[23107]: Failed password for invalid user postgres from 206.189.65.11 port 36172 ssh2
...
2019-07-28 04:51:12
217.182.68.146 attackspambots
Invalid user admin from 217.182.68.146 port 35849
2019-07-28 05:11:34
191.53.57.174 attackspam
Unauthorized connection attempt from IP address 191.53.57.174 on Port 25(SMTP)
2019-07-28 04:54:16
98.115.28.92 attackbots
Invalid user pi from 98.115.28.92 port 44218
2019-07-28 05:06:06
159.65.7.56 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-07-28 05:19:22
73.229.232.218 attackbotsspam
Invalid user vika from 73.229.232.218 port 53548
2019-07-28 04:45:33
159.65.81.187 attackspambots
2019-07-27T20:21:58.284065abusebot.cloudsearch.cf sshd\[13918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.81.187  user=root
2019-07-28 05:18:51
222.186.171.188 attackbotsspam
Invalid user dashboard from 222.186.171.188 port 41573
2019-07-28 04:49:06
106.12.22.23 attackspambots
Invalid user id from 106.12.22.23 port 39498
2019-07-28 05:04:37
46.101.119.94 attackspambots
Invalid user www from 46.101.119.94 port 51271
2019-07-28 05:09:55
202.29.70.46 attackbots
Invalid user test from 202.29.70.46 port 57534
2019-07-28 04:51:57

Recently Reported IPs

192.241.208.163 201.43.255.133 113.88.210.48 113.88.208.86
44.43.231.15 148.53.93.40 235.26.126.148 24.24.18.236
199.222.41.75 112.80.179.72 231.134.5.116 183.107.255.188
42.161.203.230 197.30.86.42 40.36.198.145 217.117.229.66
254.232.138.88 208.87.182.56 40.182.97.4 232.189.192.192