Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Karachi

Region: Sindh

Country: Pakistan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.74.20.0 - 103.74.21.255'

% Abuse contact for '103.74.20.0 - 103.74.21.255' is 'abuse@wn.com.pk'

inetnum:        103.74.20.0 - 103.74.21.255
netname:        Wizard-Net
descr:          Wizard's Network (Pvt.) Ltd.
country:        PK
admin-c:        WNPL3-AP
tech-c:         WNPL3-AP
abuse-c:        AW1039-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-WN-PK
mnt-irt:        IRT-WN-PK
last-modified:  2021-05-18T19:02:04Z
source:         APNIC

irt:            IRT-WN-PK
address:        Suite No. 401, 4th Floor,, Plot No. SB-25, Shaes Centre,, Gulshan-e-Iqbal, Block-13/C,, Main Univers
e-mail:         abuse@wn.com.pk
abuse-mailbox:  abuse@wn.com.pk
admin-c:        WNPL3-AP
tech-c:         WNPL3-AP
auth:           # Filtered
remarks:        abuse@wn.com.pk was validated on 2025-12-15
mnt-by:         MAINT-WN-PK
last-modified:  2025-12-15T09:27:39Z
source:         APNIC

role:           ABUSE WNPK
country:        ZZ
address:        Suite No. 401, 4th Floor,, Plot No. SB-25, Shaes Centre,, Gulshan-e-Iqbal, Block-13/C,, Main Univers
phone:          +000000000
e-mail:         abuse@wn.com.pk
admin-c:        WNPL3-AP
tech-c:         WNPL3-AP
nic-hdl:        AW1039-AP
remarks:        Generated from irt object IRT-WN-PK
remarks:        abuse@wn.com.pk was validated on 2025-12-15
abuse-mailbox:  abuse@wn.com.pk
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-15T09:27:48Z
source:         APNIC

role:           Wizards Network PVT Limited administrator
address:        Suite No. 401, 4th Floor,, Plot No. SB-25, Shaes Centre,, Gulshan-e-Iqbal, Block-13/C,, Main Univers
country:        PK
phone:          +923323571408
fax-no:         +923323571408
e-mail:         abuse@wn.com.pk
admin-c:        WNPL3-AP
tech-c:         WNPL3-AP
nic-hdl:        WNPL3-AP
mnt-by:         MAINT-WN-PK
last-modified:  2016-09-03T05:33:29Z
source:         APNIC

% Information related to '103.74.20.0/24AS139879'

route:          103.74.20.0/24
origin:         AS139879
descr:          Wizard's Network (PVT.) Limited.
                Near Pizza
                Blk 2
                Gulshan-e-Iqbal
mnt-by:         MAINT-WN-PK
last-modified:  2024-07-10T19:01:31Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.74.20.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34387
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.74.20.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041301 1800 900 604800 86400

;; Query time: 138 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 05:00:11 CST 2026
;; MSG SIZE  rcvd: 104
Host info
7.20.74.103.in-addr.arpa domain name pointer 103-74-20-7.galaxy.net.pk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.20.74.103.in-addr.arpa	name = 103-74-20-7.galaxy.net.pk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
59.127.181.165 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/59.127.181.165/ 
 
 TW - 1H : (100)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 59.127.181.165 
 
 CIDR : 59.127.128.0/17 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 8 
  3H - 20 
  6H - 41 
 12H - 66 
 24H - 94 
 
 DateTime : 2019-11-02 04:55:02 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-02 12:31:04
117.50.13.170 attackspambots
2019-11-02T04:26:56.813473abusebot-6.cloudsearch.cf sshd\[7236\]: Invalid user ftpuser from 117.50.13.170 port 46200
2019-11-02 12:49:51
88.247.110.88 attack
Nov  2 00:38:58 TORMINT sshd\[17632\]: Invalid user taras15 from 88.247.110.88
Nov  2 00:38:58 TORMINT sshd\[17632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.247.110.88
Nov  2 00:39:00 TORMINT sshd\[17632\]: Failed password for invalid user taras15 from 88.247.110.88 port 37770 ssh2
...
2019-11-02 13:07:31
81.169.143.234 attack
$f2bV_matches
2019-11-02 12:41:05
177.69.118.197 attack
$f2bV_matches
2019-11-02 13:05:32
189.130.55.149 attackspam
Automatic report - Port Scan Attack
2019-11-02 12:38:20
106.12.214.21 attackspambots
Nov  2 09:27:37 gw1 sshd[18683]: Failed password for root from 106.12.214.21 port 43654 ssh2
...
2019-11-02 12:43:36
219.90.67.89 attackspam
Nov  2 03:49:03 yesfletchmain sshd\[16037\]: User root from 219.90.67.89 not allowed because not listed in AllowUsers
Nov  2 03:49:03 yesfletchmain sshd\[16037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.90.67.89  user=root
Nov  2 03:49:05 yesfletchmain sshd\[16037\]: Failed password for invalid user root from 219.90.67.89 port 33998 ssh2
Nov  2 03:55:00 yesfletchmain sshd\[16147\]: User root from 219.90.67.89 not allowed because not listed in AllowUsers
Nov  2 03:55:00 yesfletchmain sshd\[16147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.90.67.89  user=root
...
2019-11-02 12:34:01
35.187.234.161 attackspam
Nov  2 05:23:07 vps647732 sshd[32181]: Failed password for root from 35.187.234.161 port 50188 ssh2
...
2019-11-02 12:38:40
201.116.194.210 attackspambots
2019-11-02T05:15:35.886348host3.slimhost.com.ua sshd[2693258]: Failed password for root from 201.116.194.210 port 51019 ssh2
2019-11-02T05:19:28.139967host3.slimhost.com.ua sshd[2695807]: Invalid user admin from 201.116.194.210 port 6604
2019-11-02T05:19:28.145721host3.slimhost.com.ua sshd[2695807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.194.210
2019-11-02T05:19:28.139967host3.slimhost.com.ua sshd[2695807]: Invalid user admin from 201.116.194.210 port 6604
2019-11-02T05:19:30.425641host3.slimhost.com.ua sshd[2695807]: Failed password for invalid user admin from 201.116.194.210 port 6604 ssh2
...
2019-11-02 12:35:43
112.85.42.227 attackspam
Nov  2 00:56:39 TORMINT sshd\[18715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
Nov  2 00:56:41 TORMINT sshd\[18715\]: Failed password for root from 112.85.42.227 port 29514 ssh2
Nov  2 00:59:09 TORMINT sshd\[18821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
...
2019-11-02 13:04:15
159.89.104.243 attack
$f2bV_matches
2019-11-02 12:57:42
191.252.195.225 attackspambots
Nov  1 18:45:32 sachi sshd\[32675\]: Invalid user a from 191.252.195.225
Nov  1 18:45:32 sachi sshd\[32675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps8811.publiccloud.com.br
Nov  1 18:45:34 sachi sshd\[32675\]: Failed password for invalid user a from 191.252.195.225 port 37970 ssh2
Nov  1 18:50:20 sachi sshd\[617\]: Invalid user 123456 from 191.252.195.225
Nov  1 18:50:20 sachi sshd\[617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps8811.publiccloud.com.br
2019-11-02 13:06:02
13.80.112.16 attackbots
Nov  2 01:06:45 plusreed sshd[2044]: Invalid user howlwolf from 13.80.112.16
...
2019-11-02 13:07:18
146.88.240.4 attack
11/02/2019-00:19:37.732143 146.88.240.4 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2019-11-02 12:32:38

Recently Reported IPs

104.140.148.102 3.89.226.152 2606:4700:10::6814:8801 2606:4700:10::6814:9913
2606:4700:10::6816:258 3.92.239.65 14.212.70.200 100.53.171.244
2606:4700:10::6814:9637 2606:4700:10::6814:5954 2606:4700:10::6814:5445 2606:4700:10::6814:5355
182.46.226.92 2606:4700:10::ac43:2054 2606:4700:10::6814:7174 2606:4700:10::6816:4940
2606:4700:10::ac43:1360 2606:4700:10::6814:7629 14.207.194.185 72.56.5.167