Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.90.166.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55577
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.90.166.74.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025122300 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 23 16:30:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 74.166.90.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 74.166.90.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.51.197.3 attackspambots
frenzy
2020-06-02 01:41:46
195.231.3.146 attack
Jun  1 19:08:10 web01.agentur-b-2.de postfix/smtpd[658555]: warning: unknown[195.231.3.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  1 19:08:10 web01.agentur-b-2.de postfix/smtpd[658555]: lost connection after AUTH from unknown[195.231.3.146]
Jun  1 19:12:04 web01.agentur-b-2.de postfix/smtpd[658555]: warning: unknown[195.231.3.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  1 19:12:04 web01.agentur-b-2.de postfix/smtpd[658555]: lost connection after AUTH from unknown[195.231.3.146]
Jun  1 19:16:21 web01.agentur-b-2.de postfix/smtpd[657733]: lost connection after CONNECT from unknown[195.231.3.146]
2020-06-02 01:52:54
96.9.70.234 attack
SSH brute force
2020-06-02 02:10:37
46.48.207.102 attackspam
1591013084 - 06/01/2020 14:04:44 Host: 46.48.207.102/46.48.207.102 Port: 445 TCP Blocked
2020-06-02 01:44:01
61.19.27.253 attackbots
SSH brute-force attempt
2020-06-02 02:07:40
36.76.172.20 attackspambots
1591030775 - 06/01/2020 18:59:35 Host: 36.76.172.20/36.76.172.20 Port: 445 TCP Blocked
2020-06-02 02:01:24
181.65.252.9 attack
Brute-force attempt banned
2020-06-02 01:49:59
117.211.60.145 attack
Unauthorized connection attempt from IP address 117.211.60.145 on Port 445(SMB)
2020-06-02 01:58:55
85.93.20.62 attackbotsspam
firewall-block, port(s): 3344/tcp
2020-06-02 01:52:12
49.233.13.145 attackspam
$f2bV_matches
2020-06-02 02:00:09
93.183.131.53 attackbotsspam
SSH_attack
2020-06-02 02:15:06
203.115.98.222 attackspambots
Unauthorized connection attempt from IP address 203.115.98.222 on Port 445(SMB)
2020-06-02 01:51:31
195.54.166.45 attack
Scanned 96 unique addresses for 18 unique ports in 24 hours
2020-06-02 02:10:03
122.51.221.184 attack
Jun  1 07:52:32 mx sshd[30316]: Failed password for root from 122.51.221.184 port 52670 ssh2
2020-06-02 02:14:29
137.74.195.183 attackspam
ENG,WP GET /news/wp-includes/wlwmanifest.xml
2020-06-02 01:54:14

Recently Reported IPs

178.128.203.219 164.92.171.132 10.0.21.68 111.33.89.122
14.212.103.125 111.63.65.247 10.60.10.118 161.58.177.255
117.136.22.251 10.0.9.127 47.237.91.69 36.41.66.155
113.141.83.185 113.141.81.222 203.132.56.30 45.124.206.69
52.169.163.135 69.164.201.99 143.110.205.70 64.227.18.198