Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.116.74.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.116.74.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 20:46:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
106.74.116.161.in-addr.arpa domain name pointer id28316.qo.ub.es.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.74.116.161.in-addr.arpa	name = id28316.qo.ub.es.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.175.107.186 attack
Unauthorized connection attempt detected from IP address 195.175.107.186 to port 23
2020-05-31 20:22:29
188.237.50.113 attack
Unauthorized connection attempt detected from IP address 188.237.50.113 to port 1433
2020-05-31 20:25:08
31.30.173.216 attackspambots
Unauthorized connection attempt detected from IP address 31.30.173.216 to port 23
2020-05-31 20:18:53
188.234.247.110 attackbots
(sshd) Failed SSH login from 188.234.247.110 (RU/Russia/net247.234.188-110.ertelecom.ru): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 31 08:18:46 ubnt-55d23 sshd[3581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.234.247.110  user=root
May 31 08:18:49 ubnt-55d23 sshd[3581]: Failed password for root from 188.234.247.110 port 55238 ssh2
2020-05-31 19:54:16
91.121.134.201 attackspam
May 31 06:45:38 root sshd[1019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3064267.ip-91-121-134.eu  user=root
May 31 06:45:39 root sshd[1019]: Failed password for root from 91.121.134.201 port 38278 ssh2
...
2020-05-31 20:10:25
177.220.165.52 attack
Unauthorized connection attempt detected from IP address 177.220.165.52 to port 8080
2020-05-31 20:27:52
213.135.85.197 attackbotsspam
SSH Brute-Force. Ports scanning.
2020-05-31 20:07:08
45.55.180.7 attackspam
SSH Brute-Force reported by Fail2Ban
2020-05-31 19:53:53
176.31.252.148 attackspambots
<6 unauthorized SSH connections
2020-05-31 19:54:42
182.72.153.134 attackspam
Unauthorized connection attempt from IP address 182.72.153.134 on Port 445(SMB)
2020-05-31 20:00:26
117.51.142.192 attackbots
Invalid user stream from 117.51.142.192 port 40060
2020-05-31 19:45:19
182.39.229.149 attack
Unauthorized connection attempt detected from IP address 182.39.229.149 to port 23
2020-05-31 20:27:18
187.57.191.49 attackspambots
Unauthorized connection attempt detected from IP address 187.57.191.49 to port 8080
2020-05-31 20:13:05
190.120.40.140 attackspambots
Unauthorized connection attempt detected from IP address 190.120.40.140 to port 81
2020-05-31 20:11:47
220.86.60.230 attack
Unauthorized connection attempt detected from IP address 220.86.60.230 to port 22
2020-05-31 20:20:46

Recently Reported IPs

61.131.54.159 193.212.5.80 179.134.228.83 199.199.224.129
248.203.58.126 87.186.248.208 88.81.164.196 49.108.138.40
188.28.21.224 193.31.87.37 237.203.130.161 179.126.250.184
137.228.48.105 229.105.82.235 195.8.70.117 130.83.228.250
220.49.66.171 69.100.62.158 8.32.93.77 67.160.195.99