Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.159.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32691
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.159.74.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040702 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 08 02:15:27 CST 2022
;; MSG SIZE  rcvd: 107
Host info
74.159.149.104.in-addr.arpa domain name pointer qctrainingonline.com.
74.159.149.104.in-addr.arpa domain name pointer rentairsoft.com.
74.159.149.104.in-addr.arpa domain name pointer thermawoodtech.com.
74.159.149.104.in-addr.arpa domain name pointer tiemannbuildingservices.com.
74.159.149.104.in-addr.arpa domain name pointer timberframeguy.com.
74.159.149.104.in-addr.arpa domain name pointer ascendaviationllc.com.
74.159.149.104.in-addr.arpa domain name pointer buildistics.com.
74.159.149.104.in-addr.arpa domain name pointer charityhvac.com.
74.159.149.104.in-addr.arpa domain name pointer devowe.com.
74.159.149.104.in-addr.arpa domain name pointer diyicf.com.
74.159.149.104.in-addr.arpa domain name pointer diysuspensionbridge.com.
74.159.149.104.in-addr.arpa domain name pointer diytowrope.com.
74.159.149.104.in-addr.arpa domain name pointer firefighterdrivertraining.com.
74.159.149.104.in-addr.arpa domain name pointer hardigrade.com.
74.159.149.104.in-addr.arpa domain name pointer heirloomproducts.com.
74.15
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
74.159.149.104.in-addr.arpa	name = thermawoodtech.com.
74.159.149.104.in-addr.arpa	name = tiemannbuildingservices.com.
74.159.149.104.in-addr.arpa	name = timberframeguy.com.
74.159.149.104.in-addr.arpa	name = ascendaviationllc.com.
74.159.149.104.in-addr.arpa	name = buildistics.com.
74.159.149.104.in-addr.arpa	name = charityhvac.com.
74.159.149.104.in-addr.arpa	name = devowe.com.
74.159.149.104.in-addr.arpa	name = diyicf.com.
74.159.149.104.in-addr.arpa	name = diysuspensionbridge.com.
74.159.149.104.in-addr.arpa	name = diytowrope.com.
74.159.149.104.in-addr.arpa	name = firefighterdrivertraining.com.
74.159.149.104.in-addr.arpa	name = hardigrade.com.
74.159.149.104.in-addr.arpa	name = heirloomproducts.com.
74.159.149.104.in-addr.arpa	name = hk-website.com.
74.159.149.104.in-addr.arpa	name = ianzvi.com.
74.159.149.104.in-addr.arpa	name = jamesdevowe.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
176.43.128.203 attack
20000/tcp 8888/tcp
[2020-08-27/10-07]2pkt
2020-10-08 19:02:21
189.90.114.37 attack
SSH login attempts.
2020-10-08 19:04:57
51.210.107.15 attack
Oct  7 20:11:28 php1 sshd\[13707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.107.15  user=root
Oct  7 20:11:30 php1 sshd\[13707\]: Failed password for root from 51.210.107.15 port 35350 ssh2
Oct  7 20:15:03 php1 sshd\[14044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.107.15  user=root
Oct  7 20:15:05 php1 sshd\[14044\]: Failed password for root from 51.210.107.15 port 41242 ssh2
Oct  7 20:18:39 php1 sshd\[14332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.107.15  user=root
2020-10-08 18:54:18
51.75.170.128 attackbots
2020-10-08 05:27:09.094728-0500  localhost sshd[52732]: Failed password for root from 51.75.170.128 port 56082 ssh2
2020-10-08 18:46:18
103.40.187.34 attackspam
445/tcp 1433/tcp
[2020-09-25/10-07]2pkt
2020-10-08 19:08:55
60.250.29.230 attackspam
SS5,Magento Bruteforce Login Attack POST /index.php/admin/
2020-10-08 18:50:54
157.230.24.226 attackspam
Oct  8 10:35:57 gospond sshd[3359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.24.226  user=root
Oct  8 10:35:59 gospond sshd[3359]: Failed password for root from 157.230.24.226 port 48638 ssh2
...
2020-10-08 19:08:35
167.99.110.179 attack
sshd: Failed password for .... from 167.99.110.179 port 52296 ssh2 (8 attempts)
2020-10-08 19:10:59
115.50.227.120 attackbots
Icarus honeypot on github
2020-10-08 18:33:58
114.67.202.170 attackspambots
Oct  8 00:49:49 server sshd[10192]: Failed password for root from 114.67.202.170 port 46100 ssh2
Oct  8 00:53:04 server sshd[12130]: Failed password for root from 114.67.202.170 port 34460 ssh2
Oct  8 00:56:18 server sshd[13893]: Failed password for root from 114.67.202.170 port 51042 ssh2
2020-10-08 18:41:02
185.63.253.200 proxy
Gabung
2020-10-08 18:36:18
151.61.62.6 attack
2020-10-07T13:26:31.025610morrigan.ad5gb.com sshd[2260867]: Failed password for invalid user pi from 151.61.62.6 port 42486 ssh2
2020-10-08 19:04:05
179.225.202.75 attackspam
1602103275 - 10/07/2020 22:41:15 Host: 179.225.202.75/179.225.202.75 Port: 445 TCP Blocked
...
2020-10-08 18:52:04
109.123.117.252 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-08 19:10:32
106.12.36.90 attack
bruteforce, ssh, scan port
2020-10-08 18:34:15

Recently Reported IPs

104.149.148.242 104.149.171.164 104.149.175.59 104.149.239.216
104.149.34.242 104.149.42.199 104.149.93.132 104.152.108.162
104.152.108.22 104.152.108.228 104.152.110.100 104.152.111.40
104.152.111.62 104.152.169.62 104.152.217.38 104.152.65.228
104.153.64.170 104.154.158.154 104.154.220.216 104.154.251.9