Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.74.124.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.74.124.21.			IN	A

;; AUTHORITY SECTION:
.			148	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122700 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 27 17:40:14 CST 2021
;; MSG SIZE  rcvd: 106
Host info
Host 21.124.74.107.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.124.74.107.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
67.33.39.213 attackspam
Automatic report - Port Scan Attack
2020-09-30 14:50:02
94.128.80.10 attackbots
Auto Fail2Ban report, multiple SSH login attempts.
2020-09-30 14:27:44
60.215.165.254 attackbots
Port Scan detected!
...
2020-09-30 14:50:57
187.107.68.86 attackspam
$f2bV_matches
2020-09-30 15:07:29
81.213.59.236 attack
Unauthorized connection attempt from IP address 81.213.59.236 on Port 445(SMB)
2020-09-30 14:30:46
163.172.38.80 attack
2020-09-30T01:48:46.541584sorsha.thespaminator.com sshd[15855]: Invalid user web7 from 163.172.38.80 port 43732
2020-09-30T01:48:49.046774sorsha.thespaminator.com sshd[15855]: Failed password for invalid user web7 from 163.172.38.80 port 43732 ssh2
...
2020-09-30 14:59:54
112.85.42.194 attackbots
Sep 30 06:34:03 plex-server sshd[769244]: Failed password for root from 112.85.42.194 port 15139 ssh2
Sep 30 06:37:56 plex-server sshd[770863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.194  user=root
Sep 30 06:37:58 plex-server sshd[770863]: Failed password for root from 112.85.42.194 port 57976 ssh2
Sep 30 06:40:33 plex-server sshd[771896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.194  user=root
Sep 30 06:40:35 plex-server sshd[771896]: Failed password for root from 112.85.42.194 port 55958 ssh2
...
2020-09-30 15:10:10
3.19.72.50 attack
RDP Brute-Force (Grieskirchen RZ2)
2020-09-30 14:29:52
180.76.161.203 attackbots
Sep 30 02:41:14 pve1 sshd[27961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.161.203 
Sep 30 02:41:17 pve1 sshd[27961]: Failed password for invalid user test from 180.76.161.203 port 57284 ssh2
...
2020-09-30 14:45:58
69.163.169.133 attackbotsspam
69.163.169.133 - - [30/Sep/2020:06:25:29 +1000] "POST /wp-login.php HTTP/1.0" 200 8055 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
69.163.169.133 - - [30/Sep/2020:07:13:46 +1000] "POST /wp-login.php HTTP/1.0" 200 8136 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
69.163.169.133 - - [30/Sep/2020:11:24:43 +1000] "POST /wp-login.php HTTP/1.0" 200 8564 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
69.163.169.133 - - [30/Sep/2020:12:09:34 +1000] "POST /wp-login.php HTTP/1.0" 200 8136 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
69.163.169.133 - - [30/Sep/2020:13:35:31 +1000] "POST /wp-login.php HTTP/1.0" 200 8564 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-30 14:39:54
212.119.241.46 attackbots
Invalid user oracle from 212.119.241.46 port 58543
2020-09-30 14:32:30
80.82.65.60 attackspambots
Vogel
2020-09-30 14:35:03
103.25.21.34 attackbots
Invalid user git from 103.25.21.34 port 23804
2020-09-30 14:43:30
164.52.24.176 attackbotsspam
IP 164.52.24.176 attacked honeypot on port: 1911 at 9/29/2020 1:37:53 PM
2020-09-30 14:37:21
2a0c:3b80:5b00:162::12c7 attack
Received: from app82.sinapptics.com ([2a0c:3b80:5b00:162::12c7])
4b42.com
2020-09-30 14:48:13

Recently Reported IPs

29.140.107.9 124.123.190.200 138.141.160.22 50.68.147.53
106.2.243.149 199.245.4.136 14.138.2.211 13.208.9.173
162.150.108.222 80.219.217.77 172.49.141.215 51.170.192.79
92.196.189.160 246.225.151.175 197.110.55.203 85.26.165.12
193.171.93.180 221.142.153.30 160.63.191.123 109.15.40.80