Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.150.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3999
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.150.74.			IN	A

;; AUTHORITY SECTION:
.			184	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032502 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 26 07:12:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 74.150.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 74.150.19.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.165.223.138 attackspam
prod6
...
2020-07-14 23:28:46
92.118.161.61 attack
Automatic report - Banned IP Access
2020-07-14 23:38:29
65.52.233.250 attack
Jul 14 20:51:55 webhost01 sshd[31220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.52.233.250
...
2020-07-15 00:04:34
13.75.147.74 attack
IP blocked
2020-07-14 23:52:56
182.61.37.35 attackspam
Jul 14 18:19:21 lukav-desktop sshd\[14042\]: Invalid user keshav from 182.61.37.35
Jul 14 18:19:21 lukav-desktop sshd\[14042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.37.35
Jul 14 18:19:23 lukav-desktop sshd\[14042\]: Failed password for invalid user keshav from 182.61.37.35 port 34812 ssh2
Jul 14 18:21:35 lukav-desktop sshd\[14121\]: Invalid user col from 182.61.37.35
Jul 14 18:21:35 lukav-desktop sshd\[14121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.37.35
2020-07-14 23:38:10
79.116.138.121 attack
Automatic report - Port Scan Attack
2020-07-14 23:29:57
167.99.10.162 attackbotsspam
Attempting to access Wordpress login on a honeypot or private system.
2020-07-14 23:41:46
114.70.229.30 attack
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-14 23:56:05
14.232.160.213 attack
(sshd) Failed SSH login from 14.232.160.213 (VN/Vietnam/-): 5 in the last 3600 secs
2020-07-15 00:03:40
20.185.32.70 attackspam
Invalid user center-kvarta.ru from 20.185.32.70 port 31296
Failed password for invalid user center-kvarta.ru from 20.185.32.70 port 31296 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.185.32.70
Invalid user center from 20.185.32.70 port 31293
Failed password for invalid user center from 20.185.32.70 port 31293 ssh2
2020-07-14 23:21:12
45.145.66.103 attack
07/14/2020-09:57:28.663190 45.145.66.103 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-15 00:02:24
111.229.61.82 attackspambots
2020-07-14T18:12:48.787829mail.standpoint.com.ua sshd[20764]: Invalid user dan from 111.229.61.82 port 42582
2020-07-14T18:12:48.790560mail.standpoint.com.ua sshd[20764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.61.82
2020-07-14T18:12:48.787829mail.standpoint.com.ua sshd[20764]: Invalid user dan from 111.229.61.82 port 42582
2020-07-14T18:12:50.421928mail.standpoint.com.ua sshd[20764]: Failed password for invalid user dan from 111.229.61.82 port 42582 ssh2
2020-07-14T18:15:39.783542mail.standpoint.com.ua sshd[21127]: Invalid user andries from 111.229.61.82 port 43108
...
2020-07-14 23:22:45
109.203.192.124 attackspambots
Jul 14 16:17:04 vpn01 sshd[19794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.203.192.124
Jul 14 16:17:06 vpn01 sshd[19794]: Failed password for invalid user demo from 109.203.192.124 port 56450 ssh2
...
2020-07-14 23:45:58
223.71.167.163 attackspam
Unauthorized connection attempt detected from IP address 223.71.167.163 to port 1863
2020-07-14 23:55:43
106.12.6.195 attackspam
2020-07-14T08:48:56.6990221495-001 sshd[49570]: Invalid user webmaster from 106.12.6.195 port 48598
2020-07-14T08:48:58.9787801495-001 sshd[49570]: Failed password for invalid user webmaster from 106.12.6.195 port 48598 ssh2
2020-07-14T08:53:46.1210301495-001 sshd[49781]: Invalid user postgres from 106.12.6.195 port 48174
2020-07-14T08:53:46.1241941495-001 sshd[49781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.6.195
2020-07-14T08:53:46.1210301495-001 sshd[49781]: Invalid user postgres from 106.12.6.195 port 48174
2020-07-14T08:53:47.8784331495-001 sshd[49781]: Failed password for invalid user postgres from 106.12.6.195 port 48174 ssh2
...
2020-07-14 23:56:38

Recently Reported IPs

104.19.150.4 104.19.157.109 104.19.160.210 104.19.173.71
104.19.176.49 104.19.177.49 104.19.180.106 104.19.181.106
104.19.182.23 104.19.185.6 104.19.185.86 104.19.186.55
104.19.186.6 104.19.186.86 104.19.19.99 7.225.135.66
104.19.190.19 104.19.191.160 104.19.191.19 104.19.199.176