AbuseIPDB » 20.218.98.16

Check an IP Address, Domain Name, or Subnet

e.g. 18.232.59.38, microsoft.com, or 5.188.10.0/24

20.218.98.16 was found in our database!

This IP was reported 17 times. Confidence of Abuse is 74%: ?

74%
ISP Microsoft Corporation
Usage Type Data Center/Web Hosting/Transit
Domain Name microsoft.com
Country Germany
City Frankfurt am Main, Hessen

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 20.218.98.16:

This IP address has been reported a total of 17 times from 15 distinct sources. 20.218.98.16 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
dwmp
Brute-Force SSH
Chip
20.218.98.16 triggered Icarus honeypot on port 22. Check us out on github.
Port Scan Hacking
Anonymous
Trying ports that it shouldn't be.
Port Scan Hacking Exploited Host
www.blocklist.de
FTP Brute-Force Hacking
Hirte
HHV-W: TCP-Scanner. Port: 22
Port Scan
auto_reporter
Unauthorized port sweep
Port Scan
sumnone
Port probing on unauthorized port 22
Port Scan Hacking Exploited Host
SecondBanana
May 27 23:24:20 flask sshd[5034]: Connection closed by 20.218.98.16 port 52476 [preauth]
...
Brute-Force SSH
Teapot
Brute-Force SSH
mhhdr
SSH Unauthorized Connection. Tarpitted for 17 s.
Brute-Force SSH
m2jest1c
Brute-Force SSH
L Q
May 27 11:14:05 Server sshd[132183]: Connection closed by 20.218.98.16 port 34394 [preauth]
SSH
ghostwarriors
Unauthorized connection attempt detected, SSH Brute-Force
Port Scan Brute-Force SSH
www.blocklist.de
FTP Brute-Force Hacking
SchorelWeb
(sshd) Failed SSH login from 20.218.98.16 (DE/Germany/-): 4 in the last (Omitted)
Brute-Force SSH

Showing 1 to 15 of 17 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com