Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Houston

Region: Texas

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.239.74.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9427
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;108.239.74.13.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051700 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 23:25:07 CST 2019
;; MSG SIZE  rcvd: 117

Host info
13.74.239.108.in-addr.arpa domain name pointer 108-239-74-13.lightspeed.hstntx.sbcglobal.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
13.74.239.108.in-addr.arpa	name = 108-239-74-13.lightspeed.hstntx.sbcglobal.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
115.49.1.194 attack
port 23 attempt blocked
2019-11-18 01:58:13
51.75.147.100 attackbotsspam
Nov 17 17:22:14 localhost sshd\[3276\]: Invalid user cryer from 51.75.147.100 port 45778
Nov 17 17:22:14 localhost sshd\[3276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.147.100
Nov 17 17:22:17 localhost sshd\[3276\]: Failed password for invalid user cryer from 51.75.147.100 port 45778 ssh2
Nov 17 17:25:59 localhost sshd\[3383\]: Invalid user brandlin from 51.75.147.100 port 57848
Nov 17 17:25:59 localhost sshd\[3383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.147.100
...
2019-11-18 01:46:51
110.35.79.23 attackbotsspam
Nov 17 12:37:45 TORMINT sshd\[30818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.79.23  user=root
Nov 17 12:37:48 TORMINT sshd\[30818\]: Failed password for root from 110.35.79.23 port 39416 ssh2
Nov 17 12:42:10 TORMINT sshd\[31226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.79.23  user=root
...
2019-11-18 02:14:45
142.93.238.162 attack
2019-11-17T14:41:25.071817abusebot-8.cloudsearch.cf sshd\[24004\]: Invalid user password from 142.93.238.162 port 55492
2019-11-18 02:21:44
188.226.182.209 attackbots
Nov 17 17:25:04 mout sshd[26870]: Invalid user sherry from 188.226.182.209 port 60325
2019-11-18 01:53:30
178.128.250.18 attack
Fail2Ban Ban Triggered
2019-11-18 02:02:51
106.13.56.45 attackbots
" "
2019-11-18 02:04:01
222.186.175.161 attackbots
Nov 17 18:41:06 jane sshd[10122]: Failed password for root from 222.186.175.161 port 61456 ssh2
Nov 17 18:41:10 jane sshd[10122]: Failed password for root from 222.186.175.161 port 61456 ssh2
...
2019-11-18 01:56:03
81.22.45.20 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-18 02:07:19
167.99.182.30 attackbotsspam
ft-1848-basketball.de 167.99.182.30 [17/Nov/2019:15:41:47 +0100] "POST /wp-login.php HTTP/1.1" 200 2545 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
ft-1848-basketball.de 167.99.182.30 [17/Nov/2019:15:41:50 +0100] "POST /wp-login.php HTTP/1.1" 200 2545 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-18 02:06:00
185.209.0.89 attackbotsspam
11/17/2019-18:20:41.873527 185.209.0.89 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-18 01:45:30
178.19.108.74 attackspam
firewall-block, port(s): 8545/tcp
2019-11-18 01:50:45
125.236.203.114 attackbotsspam
RDP Bruteforce
2019-11-18 02:15:09
5.196.118.54 attackspambots
5.196.118.54 - - \[17/Nov/2019:15:07:40 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
5.196.118.54 - - \[17/Nov/2019:15:07:41 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-18 01:59:15
192.34.62.227 attackspam
Nov 17 17:35:08 mout sshd[27607]: Connection closed by 192.34.62.227 port 36141 [preauth]
2019-11-18 01:54:09

Recently Reported IPs

107.170.201.95 5.147.22.164 45.55.53.100 8.47.42.215
35.102.134.254 166.173.206.143 23.74.22.228 132.44.109.170
90.133.218.194 171.250.91.120 189.102.116.234 207.70.198.165
119.171.9.132 113.77.183.141 122.148.6.102 78.82.38.33
24.60.145.9 210.124.102.17 132.12.199.114 145.247.85.187