Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Houston

Region: Texas

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.239.74.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9427
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;108.239.74.13.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051700 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 23:25:07 CST 2019
;; MSG SIZE  rcvd: 117

Host info
13.74.239.108.in-addr.arpa domain name pointer 108-239-74-13.lightspeed.hstntx.sbcglobal.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
13.74.239.108.in-addr.arpa	name = 108-239-74-13.lightspeed.hstntx.sbcglobal.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
49.36.9.120 attack
Unauthorized connection attempt from IP address 49.36.9.120 on Port 445(SMB)
2020-05-22 02:22:36
42.113.120.44 attack
Unauthorized connection attempt from IP address 42.113.120.44 on Port 445(SMB)
2020-05-22 02:02:41
83.102.135.203 attack
Fail2Ban Ban Triggered
2020-05-22 01:49:44
129.211.38.207 attackspambots
$f2bV_matches
2020-05-22 02:01:59
185.176.27.246 attack
05/21/2020-09:20:09.515976 185.176.27.246 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-22 01:53:18
222.186.31.166 attack
21.05.2020 17:56:11 SSH access blocked by firewall
2020-05-22 02:07:22
219.78.231.131 attackspambots
20 attempts against mh-ssh on echoip
2020-05-22 02:21:18
190.52.166.83 attackbots
Bruteforce detected by fail2ban
2020-05-22 01:51:27
83.110.213.216 attackbotsspam
honeypot 22 port
2020-05-22 01:59:08
138.68.57.143 attack
Invalid user lqr from 138.68.57.143 port 39488
2020-05-22 02:00:33
195.231.4.203 attackbots
16224/tcp 28029/tcp 26292/tcp...
[2020-04-19/05-20]92pkt,32pt.(tcp)
2020-05-22 02:18:17
14.98.168.6 attackspambots
Unauthorized connection attempt detected from IP address 14.98.168.6 to port 445 [T]
2020-05-22 01:48:59
188.165.231.68 attackspam
Automatic report - Windows Brute-Force Attack
2020-05-22 01:57:06
113.85.28.93 attack
Email rejected due to spam filtering
2020-05-22 02:00:56
113.137.36.187 attackspambots
May 21 19:26:54 lukav-desktop sshd\[4606\]: Invalid user mmx from 113.137.36.187
May 21 19:26:54 lukav-desktop sshd\[4606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.137.36.187
May 21 19:26:55 lukav-desktop sshd\[4606\]: Failed password for invalid user mmx from 113.137.36.187 port 59182 ssh2
May 21 19:29:12 lukav-desktop sshd\[4665\]: Invalid user ayw from 113.137.36.187
May 21 19:29:12 lukav-desktop sshd\[4665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.137.36.187
2020-05-22 02:15:26

Recently Reported IPs

107.170.201.95 5.147.22.164 45.55.53.100 8.47.42.215
35.102.134.254 166.173.206.143 23.74.22.228 132.44.109.170
90.133.218.194 171.250.91.120 189.102.116.234 207.70.198.165
119.171.9.132 113.77.183.141 122.148.6.102 78.82.38.33
24.60.145.9 210.124.102.17 132.12.199.114 145.247.85.187