Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.179.74.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2748
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.179.74.132.			IN	A

;; AUTHORITY SECTION:
.			400	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 04:24:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
132.74.179.109.in-addr.arpa domain name pointer 109.179.74.132.tmi.telenormobil.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.74.179.109.in-addr.arpa	name = 109.179.74.132.tmi.telenormobil.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.100.35.0 attackbotsspam
web Attack on Website
2019-11-19 00:51:26
124.217.235.145 attackspam
Automatic report - Banned IP Access
2019-11-19 01:09:07
173.164.6.1 attack
web Attack on Website
2019-11-19 01:20:01
50.207.163.1 attack
web Attack on Website
2019-11-19 01:05:25
106.13.25.242 attackspambots
Nov 18 15:42:00 ns382633 sshd\[25681\]: Invalid user fco from 106.13.25.242 port 54126
Nov 18 15:42:00 ns382633 sshd\[25681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.25.242
Nov 18 15:42:02 ns382633 sshd\[25681\]: Failed password for invalid user fco from 106.13.25.242 port 54126 ssh2
Nov 18 15:51:21 ns382633 sshd\[27644\]: Invalid user dwlee200 from 106.13.25.242 port 47514
Nov 18 15:51:21 ns382633 sshd\[27644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.25.242
2019-11-19 01:18:16
106.13.11.1 attack
web Attack on Website
2019-11-19 01:31:16
159.203.201.4 attackspambots
11/18/2019-18:14:24.804976 159.203.201.4 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-19 01:23:25
27.224.137.2 attack
web Attack on Website
2019-11-19 00:53:08
39.105.189.1 attack
web Attack on Website
2019-11-19 01:07:12
200.84.232.181 attackspam
DATE:2019-11-18 15:51:17, IP:200.84.232.181, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2019-11-19 01:28:46
181.113.225.1 attackspambots
web Attack on Website
2019-11-19 01:12:05
212.18.223.2 attack
web Attack on Website
2019-11-19 01:05:51
87.98.136.1 attackspambots
web Attack on Website
2019-11-19 01:04:13
185.199.26.1 attack
web Attack on Website
2019-11-19 01:16:34
134.175.121.1 attackspam
web Attack on Website
2019-11-19 01:30:36

Recently Reported IPs

42.253.79.51 160.244.139.111 170.176.68.230 81.196.43.24
111.162.222.189 169.133.217.18 151.216.38.187 236.60.188.76
151.110.83.45 40.107.96.152 45.177.110.23 199.124.55.184
44.79.237.254 148.99.151.33 100.106.10.37 112.255.115.179
192.186.44.235 218.30.193.50 127.33.44.62 47.67.57.98