Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.139.74.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41430
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;10.139.74.214.			IN	A

;; AUTHORITY SECTION:
.			261	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031600 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 15:38:58 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 214.74.139.10.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.74.139.10.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.75.4.79 attack
$f2bV_matches
2020-03-12 13:38:52
178.171.67.81 attack
Chat Spam
2020-03-12 13:38:02
163.172.103.164 attackbots
[portscan] Port scan
2020-03-12 14:02:55
92.157.70.228 attack
5x Failed Password
2020-03-12 13:31:32
148.70.33.136 attackspam
$f2bV_matches
2020-03-12 14:05:13
182.16.4.38 attackspam
firewall-block, port(s): 1433/tcp
2020-03-12 13:44:05
106.13.86.199 attackbots
SSH bruteforce (Triggered fail2ban)
2020-03-12 14:04:12
116.105.216.179 attack
Mar 12 06:27:27 tuxlinux sshd[9530]: Invalid user admin from 116.105.216.179 port 33860
...
2020-03-12 13:28:35
84.117.163.220 attackbots
Automatic report - Port Scan Attack
2020-03-12 13:41:45
185.176.27.250 attackbotsspam
03/12/2020-01:20:51.663965 185.176.27.250 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-12 13:32:55
46.164.143.82 attack
Mar 12 05:27:27 santamaria sshd\[10210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.164.143.82  user=root
Mar 12 05:27:28 santamaria sshd\[10210\]: Failed password for root from 46.164.143.82 port 55736 ssh2
Mar 12 05:33:44 santamaria sshd\[10269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.164.143.82  user=root
...
2020-03-12 13:27:00
58.215.215.134 attack
...
2020-03-12 13:50:40
148.70.159.5 attackbotsspam
Brute-force attempt banned
2020-03-12 13:30:09
175.140.32.60 attackbots
2020-03-11T20:54:56.782296-07:00 suse-nuc sshd[9085]: Invalid user gnats from 175.140.32.60 port 34714
...
2020-03-12 13:45:50
212.64.67.116 attackbots
2020-03-12 04:54:39,133 fail2ban.actions: WARNING [ssh] Ban 212.64.67.116
2020-03-12 14:00:37

Recently Reported IPs

114.122.196.120 81.231.206.145 13.171.226.100 166.103.104.36
155.8.135.66 13.228.227.75 165.180.69.179 208.211.60.50
91.214.64.2 23.166.69.97 24.103.227.245 66.94.105.9
48.194.137.220 10.211.116.227 189.238.221.113 163.127.30.30
174.231.130.32 76.247.238.130 149.99.204.239 140.175.164.60