Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.193.49.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.193.49.74.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 02:08:42 CST 2025
;; MSG SIZE  rcvd: 106
Host info
74.49.193.139.in-addr.arpa domain name pointer fm-dyn-139-193-49-74.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
74.49.193.139.in-addr.arpa	name = fm-dyn-139-193-49-74.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
50.63.167.184 attackspam
xmlrpc attack
2019-12-13 05:26:22
104.236.61.100 attackspambots
Dec 10 16:29:25 *** sshd[7305]: Failed password for invalid user test from 104.236.61.100 port 54927 ssh2
Dec 10 16:40:33 *** sshd[7555]: Failed password for invalid user cmmt6 from 104.236.61.100 port 54330 ssh2
Dec 10 16:48:58 *** sshd[7754]: Failed password for invalid user server from 104.236.61.100 port 59011 ssh2
Dec 10 17:00:04 *** sshd[8381]: Failed password for invalid user griffie from 104.236.61.100 port 35492 ssh2
Dec 10 17:16:42 *** sshd[8880]: Failed password for invalid user hadoop from 104.236.61.100 port 44884 ssh2
Dec 10 17:41:16 *** sshd[9456]: Failed password for invalid user wwwadmin from 104.236.61.100 port 58934 ssh2
Dec 10 17:57:21 *** sshd[9767]: Failed password for invalid user operator from 104.236.61.100 port 40082 ssh2
Dec 10 18:13:14 *** sshd[10163]: Failed password for invalid user server from 104.236.61.100 port 49414 ssh2
Dec 10 18:20:59 *** sshd[10309]: Failed password for invalid user host from 104.236.61.100 port 54094 ssh2
Dec 10 18:28:45 *** sshd[10486]: Failed password f
2019-12-13 05:09:58
14.176.101.75 attackbotsspam
1576161436 - 12/12/2019 15:37:16 Host: 14.176.101.75/14.176.101.75 Port: 445 TCP Blocked
2019-12-13 05:05:20
182.160.101.51 attackspam
Telnetd brute force attack detected by fail2ban
2019-12-13 05:11:12
5.133.66.13 attackspam
Autoban   5.133.66.13 AUTH/CONNECT
2019-12-13 05:13:14
49.245.126.193 attackspam
Autoban   49.245.126.193 AUTH/CONNECT
2019-12-13 05:33:57
5.133.66.218 attack
Autoban   5.133.66.218 AUTH/CONNECT
2019-12-13 04:55:47
62.210.214.151 attackbots
Dec 12 18:53:10 debian-2gb-nbg1-2 kernel: \[24454727.543848\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=62.210.214.151 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=62273 PROTO=TCP SPT=51223 DPT=2222 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-13 05:10:16
5.133.66.110 attack
Autoban   5.133.66.110 AUTH/CONNECT
2019-12-13 05:24:47
104.248.58.71 attackspam
Dec 12 21:36:46 icinga sshd[5901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.58.71
Dec 12 21:36:48 icinga sshd[5901]: Failed password for invalid user $secure$ from 104.248.58.71 port 56926 ssh2
...
2019-12-13 05:35:05
176.88.197.114 attack
Unauthorized connection attempt detected from IP address 176.88.197.114 to port 445
2019-12-13 05:19:13
193.188.22.229 attackbots
Dec 12 20:53:03 XXX sshd[1671]: Invalid user james from 193.188.22.229 port 58111
2019-12-13 05:34:39
185.143.223.132 attackspam
Dec 12 23:56:13 debian-2gb-vpn-nbg1-1 kernel: [562552.426464] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.132 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=64677 PROTO=TCP SPT=44548 DPT=13220 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-13 04:56:42
5.108.129.85 attackbotsspam
Autoban   5.108.129.85 AUTH/CONNECT
2019-12-13 05:31:31
5.133.66.121 attackbotsspam
Autoban   5.133.66.121 AUTH/CONNECT
2019-12-13 05:20:25

Recently Reported IPs

128.161.210.35 42.123.109.230 42.168.36.151 127.78.249.217
190.166.177.23 48.170.125.36 167.197.49.210 161.166.246.73
36.116.222.141 68.18.75.169 41.137.1.127 248.197.133.239
241.128.117.72 128.196.0.91 115.244.216.9 200.118.12.28
199.212.170.202 67.17.14.40 199.171.184.134 214.23.29.249