Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cumming

Region: Georgia

Country: United States

Internet Service Provider: AT&T Corp.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbots
Unauthorized connection attempt detected from IP address 104.8.74.55 to port 88 [J]
2020-02-05 19:08:38
attackbots
Unauthorized connection attempt detected from IP address 104.8.74.55 to port 8000 [J]
2020-01-31 04:04:01
attack
Unauthorized connection attempt detected from IP address 104.8.74.55 to port 80
2020-01-09 14:05:28
attack
Unauthorized connection attempt detected from IP address 104.8.74.55 to port 8080 [J]
2020-01-06 15:18:31
attackspambots
Unauthorized connection attempt detected from IP address 104.8.74.55 to port 8000
2019-12-30 03:34:09
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.8.74.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.8.74.55.			IN	A

;; AUTHORITY SECTION:
.			360	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122901 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 30 03:34:06 CST 2019
;; MSG SIZE  rcvd: 115
Host info
55.74.8.104.in-addr.arpa domain name pointer 104-8-74-55.lightspeed.tukrga.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.74.8.104.in-addr.arpa	name = 104-8-74-55.lightspeed.tukrga.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
96.67.115.46 attackbots
Aug  7 19:15:29 mail sshd\[23424\]: Invalid user 1asd2asd3asd from 96.67.115.46 port 49592
Aug  7 19:15:29 mail sshd\[23424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.67.115.46
...
2019-08-08 05:16:47
13.69.101.35 attackspambots
3389BruteforceFW22
2019-08-08 05:22:53
77.247.110.27 attack
SIP Server BruteForce Attack
2019-08-08 05:12:44
51.38.57.78 attackbots
Aug  7 22:54:09 SilenceServices sshd[11135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.57.78
Aug  7 22:54:11 SilenceServices sshd[11135]: Failed password for invalid user oracle5 from 51.38.57.78 port 32986 ssh2
Aug  7 22:56:29 SilenceServices sshd[12351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.57.78
2019-08-08 05:09:38
68.183.46.73 attackbots
SSH Brute-Force reported by Fail2Ban
2019-08-08 05:18:18
104.248.185.25 attack
08/07/2019-13:39:29.363434 104.248.185.25 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-08 05:23:10
144.217.164.104 attackspam
Automatic report - Banned IP Access
2019-08-08 05:11:52
82.194.210.31 attack
firewall-block, port(s): 2323/tcp
2019-08-08 05:10:31
131.100.77.18 attackbotsspam
Brute force attack to crack SMTP password (port 25 / 587)
2019-08-08 05:12:28
162.247.74.200 attackbots
Aug  7 05:27:12 *** sshd[11445]: Failed password for invalid user sansforensics from 162.247.74.200 port 32972 ssh2
Aug  7 05:27:18 *** sshd[11450]: Failed password for invalid user elk_user from 162.247.74.200 port 35588 ssh2
2019-08-08 04:45:43
190.85.181.74 attackspam
Automatic report - Port Scan Attack
2019-08-08 05:32:11
54.255.201.28 attackbots
Admin access: 
54.255.201.28 - - [06/Aug/2019:10:16:54 +0100] "GET /manager/html HTTP/1.1" 404 525 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0)"
2019-08-08 05:26:22
193.29.15.192 attackbotsspam
1565201090 - 08/07/2019 20:04:50 Host: 193.29.15.192/193.29.15.192 Port: 1900 UDP Blocked
2019-08-08 05:27:11
197.234.132.115 attack
Brute force SMTP login attempted.
...
2019-08-08 04:50:11
83.48.42.223 attackspambots
$f2bV_matches
2019-08-08 04:57:26

Recently Reported IPs

163.117.151.88 88.233.106.123 93.27.71.57 93.67.207.55
50.55.15.93 83.21.98.61 69.5.243.85 92.112.26.182
72.203.144.185 91.92.208.192 69.57.169.154 192.94.113.68
90.71.132.107 160.171.130.106 190.125.216.25 86.138.94.45
88.247.166.29 177.159.106.176 147.84.64.137 245.12.90.154