Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.74.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.74.69.			IN	A

;; AUTHORITY SECTION:
.			387	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 10:40:49 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'Host 69.74.149.104.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 104.149.74.69.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
95.91.74.80 attackbots
20 attempts against mh-misbehave-ban on twig
2020-04-24 19:20:24
186.224.48.10 attack
Unauthorized connection attempt from IP address 186.224.48.10 on Port 445(SMB)
2020-04-24 19:50:22
187.189.65.51 attackbotsspam
Invalid user bv from 187.189.65.51 port 54638
2020-04-24 19:43:06
104.248.237.238 attack
SSH login attempts.
2020-04-24 19:19:09
85.14.242.76 attackbots
Brute-Force DDOS attack against RDP.
2020-04-24 20:00:51
106.75.13.192 attackbotsspam
Apr 24 10:03:11 mail sshd[4756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.13.192
Apr 24 10:03:13 mail sshd[4756]: Failed password for invalid user ubuntu from 106.75.13.192 port 60390 ssh2
Apr 24 10:06:09 mail sshd[5253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.13.192
2020-04-24 19:45:03
37.49.226.127 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-24 19:19:50
189.240.4.201 attackbotsspam
Invalid user master from 189.240.4.201 port 53166
2020-04-24 19:31:44
41.226.172.180 attackbotsspam
Unauthorized connection attempt from IP address 41.226.172.180 on Port 445(SMB)
2020-04-24 19:34:04
165.22.77.163 attackbotsspam
Invalid user kp from 165.22.77.163 port 53162
2020-04-24 19:51:14
207.154.215.119 attack
SSH brute-force attempt
2020-04-24 19:18:11
35.194.64.202 attack
SSH login attempts.
2020-04-24 19:24:12
85.172.55.57 attack
Unauthorized connection attempt from IP address 85.172.55.57 on Port 445(SMB)
2020-04-24 19:56:24
210.240.95.131 attackspam
Attempted connection to port 1433.
2020-04-24 19:55:49
171.224.178.155 attack
Unauthorized connection attempt from IP address 171.224.178.155 on Port 445(SMB)
2020-04-24 19:36:22

Recently Reported IPs

104.149.74.66 104.149.74.70 104.149.74.68 104.149.74.71
104.149.74.72 104.149.74.76 104.149.74.74 104.149.74.75
104.16.17.98 104.158.228.135 104.16.33.106 104.16.47.74
104.16.83.96 104.16.83.8 104.16.84.8 104.16.91.22
104.16.93.26 104.160.25.68 104.160.23.245 104.161.48.242