Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.74.19.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5303
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.74.19.139.			IN	A

;; AUTHORITY SECTION:
.			544	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:08:15 CST 2024
;; MSG SIZE  rcvd: 105
Host info
Host 139.19.74.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.19.74.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.53.69.173 attack
2019-10-31T04:51:11.855654abusebot-8.cloudsearch.cf sshd\[27641\]: Invalid user jorge from 106.53.69.173 port 40810
2019-10-31 18:50:57
36.70.75.44 attack
445/tcp
[2019-10-31]1pkt
2019-10-31 18:20:10
171.225.254.115 attackbots
445/tcp
[2019-10-31]1pkt
2019-10-31 18:44:17
103.133.111.135 attackspambots
[portscan] Port scan
2019-10-31 18:47:52
112.78.132.120 attackbotsspam
445/tcp
[2019-10-31]1pkt
2019-10-31 18:10:44
49.86.181.136 attackbots
Oct 30 23:36:02 esmtp postfix/smtpd[8262]: lost connection after AUTH from unknown[49.86.181.136]
Oct 30 23:36:03 esmtp postfix/smtpd[8262]: lost connection after AUTH from unknown[49.86.181.136]
Oct 30 23:36:05 esmtp postfix/smtpd[8262]: lost connection after AUTH from unknown[49.86.181.136]
Oct 30 23:36:06 esmtp postfix/smtpd[8262]: lost connection after AUTH from unknown[49.86.181.136]
Oct 30 23:36:07 esmtp postfix/smtpd[8264]: lost connection after AUTH from unknown[49.86.181.136]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.86.181.136
2019-10-31 18:48:14
92.222.88.22 attackbots
$f2bV_matches
2019-10-31 18:26:49
27.79.210.154 attackbotsspam
445/tcp
[2019-10-31]1pkt
2019-10-31 18:25:22
217.174.248.51 attack
CloudCIX Reconnaissance Scan Detected, PTR: server217-174-248-51.live-servers.net.
2019-10-31 18:33:13
80.232.250.242 attackspam
RDP Bruteforce
2019-10-31 18:34:27
178.46.211.118 attack
23/tcp
[2019-10-31]1pkt
2019-10-31 18:14:12
222.186.169.192 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
Failed password for root from 222.186.169.192 port 60006 ssh2
Failed password for root from 222.186.169.192 port 60006 ssh2
Failed password for root from 222.186.169.192 port 60006 ssh2
Failed password for root from 222.186.169.192 port 60006 ssh2
2019-10-31 18:25:56
62.234.62.191 attackspambots
Automatic report - Banned IP Access
2019-10-31 18:16:19
14.187.24.96 attackbots
445/tcp 445/tcp 445/tcp
[2019-10-31]3pkt
2019-10-31 18:22:21
77.40.62.238 attackspam
IP: 77.40.62.238
ASN: AS12389 Rostelecom
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 31/10/2019 6:09:45 AM UTC
2019-10-31 18:10:15

Recently Reported IPs

11.74.169.104 11.74.18.113 11.74.113.158 11.74.116.55
11.77.18.250 11.77.137.108 11.74.80.77 11.75.101.21
11.77.45.167 11.75.86.106 11.74.119.106 11.74.67.131
11.73.3.82 11.77.7.122 11.77.216.48 11.73.90.129
11.74.124.192 11.75.12.238 11.74.135.228 11.74.112.115