Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.155.104.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41323
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.155.104.74.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:25:53 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 74.104.155.164.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 164.155.104.74.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
154.223.171.112 attackbotsspam
445/tcp
[2019-06-21]1pkt
2019-06-22 04:41:58
115.28.154.44 attackbotsspam
xmlrpc attack
2019-06-22 04:48:36
142.93.155.120 attackbotsspam
23/tcp 23/tcp
[2019-06-21]2pkt
2019-06-22 04:48:04
185.161.115.146 attack
Request: "GET / HTTP/1.1"
2019-06-22 04:38:15
191.37.128.83 attack
Request: "GET / HTTP/1.1"
2019-06-22 04:39:09
59.144.137.186 attackspam
Jun 17 09:41:57 hochezhostnamejf sshd[11469]: Invalid user support from 59.144.137.186
Jun 17 09:41:58 hochezhostnamejf sshd[11469]: Failed password for invalid user support from 59.144.137.186 port 60214 ssh2
Jun 17 09:41:59 hochezhostnamejf sshd[11471]: Invalid user ubnt from 59.144.137.186
Jun 17 09:41:59 hochezhostnamejf sshd[11471]: Failed password for invalid user ubnt from 59.144.137.186 port 60656 ssh2
Jun 17 09:42:01 hochezhostnamejf sshd[11474]: Invalid user cisco from 59.144.137.186
Jun 17 09:42:01 hochezhostnamejf sshd[11474]: Failed password for invalid user cisco from 59.144.137.186 port 60909 ssh2
Jun 17 09:42:02 hochezhostnamejf sshd[11483]: Invalid user pi from 59.144.137.186
Jun 17 09:42:02 hochezhostnamejf sshd[11483]: Failed password for invalid user pi from 59.144.137.186 port 32923 ssh2
Jun 17 09:42:05 hochezhostnamejf sshd[11485]: User r.r from 59.144.137.186 not allowed because not listed in AllowUsers
Jun 17 09:42:06 hochezhostnamejf sshd[11485]:........
------------------------------
2019-06-22 04:51:21
81.19.139.241 attackspambots
3389/tcp
[2019-06-21]1pkt
2019-06-22 04:59:50
54.39.181.229 attackbotsspam
Request: "GET /xyz.php HTTP/1.1" Request: "GET /sh8541.php HTTP/1.1" Request: "GET /sh8541.php HTTP/1.1"
2019-06-22 04:26:37
46.166.190.170 attackbots
Bad Bot Request: "HEAD / HTTP/1.1" Agent: "Mozilla/5.0 (compatible; Uptimebot/1.0;  http://www.uptime.com/uptimebot)"
2019-06-22 04:26:54
42.86.77.124 attackbots
23/tcp
[2019-06-21]1pkt
2019-06-22 04:34:04
46.101.114.225 attack
Bad Request: "\x15\x03\x01\x00\x02\x02P" Bad Request: "\x15\x03\x01\x00\x02\x02P"
2019-06-22 04:28:59
177.33.139.26 attackspam
¯\_(ツ)_/¯
2019-06-22 04:36:09
51.15.138.232 attack
Bad Request: "GET /xmlrpc.php HTTP/1.1"
2019-06-22 04:57:18
103.91.54.100 attack
SSH bruteforce
2019-06-22 04:37:46
162.243.150.192 attack
Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x"
2019-06-22 04:58:35

Recently Reported IPs

164.155.104.68 164.155.104.78 164.155.104.84 164.155.104.82
164.155.104.95 164.155.105.1 164.155.105.106 164.155.105.129
164.155.105.105 164.155.105.135 164.155.105.14 164.155.105.162
164.155.105.155 164.155.105.163 164.155.105.194 164.155.105.202
164.155.105.2 164.155.105.193 164.155.105.203 164.155.105.216