Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.52.74.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29580
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;19.52.74.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 05:08:12 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 66.74.52.19.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.74.52.19.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
141.98.10.211 attack
Sep 13 06:10:26 plusreed sshd[23473]: Invalid user admin from 141.98.10.211
...
2020-09-13 18:27:33
116.68.160.114 attack
SSH/22 MH Probe, BF, Hack -
2020-09-13 18:16:41
159.89.89.65 attackspambots
Sep 13 11:20:34 marvibiene sshd[22941]: Failed password for root from 159.89.89.65 port 35072 ssh2
2020-09-13 18:01:48
144.217.94.188 attackspam
Failed password for invalid user html from 144.217.94.188 port 34266 ssh2
2020-09-13 18:02:19
189.90.14.101 attack
Sep 13 11:51:32 host1 sshd[247617]: Invalid user jix from 189.90.14.101 port 62145
Sep 13 11:51:32 host1 sshd[247617]: Invalid user jix from 189.90.14.101 port 62145
Sep 13 11:51:32 host1 sshd[247617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.14.101 
Sep 13 11:51:32 host1 sshd[247617]: Invalid user jix from 189.90.14.101 port 62145
Sep 13 11:51:34 host1 sshd[247617]: Failed password for invalid user jix from 189.90.14.101 port 62145 ssh2
...
2020-09-13 17:55:59
159.65.30.66 attackbots
Sep 13 08:09:09 IngegnereFirenze sshd[14623]: User root from 159.65.30.66 not allowed because not listed in AllowUsers
...
2020-09-13 18:30:32
206.189.26.246 attackbotsspam
206.189.26.246 - - [12/Sep/2020:18:39:39 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.26.246 - - [12/Sep/2020:18:51:03 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-13 18:23:19
106.12.37.20 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 96 - port: 4837 proto: tcp cat: Misc Attackbytes: 60
2020-09-13 18:20:12
141.98.10.214 attackbots
Sep 13 06:10:37 plusreed sshd[23516]: Invalid user admin from 141.98.10.214
...
2020-09-13 18:18:49
27.4.169.146 attackbots
port scan and connect, tcp 23 (telnet)
2020-09-13 18:01:30
185.220.102.249 attackbotsspam
Sep 13 11:56:14 ns382633 sshd\[17768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.249  user=root
Sep 13 11:56:17 ns382633 sshd\[17768\]: Failed password for root from 185.220.102.249 port 21966 ssh2
Sep 13 11:56:19 ns382633 sshd\[17768\]: Failed password for root from 185.220.102.249 port 21966 ssh2
Sep 13 11:56:22 ns382633 sshd\[17768\]: Failed password for root from 185.220.102.249 port 21966 ssh2
Sep 13 11:56:23 ns382633 sshd\[17768\]: Failed password for root from 185.220.102.249 port 21966 ssh2
2020-09-13 18:14:50
45.155.173.186 attack
Sep 13 11:28:45 cho sshd[2811966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.155.173.186 
Sep 13 11:28:45 cho sshd[2811966]: Invalid user pvkii from 45.155.173.186 port 43984
Sep 13 11:28:48 cho sshd[2811966]: Failed password for invalid user pvkii from 45.155.173.186 port 43984 ssh2
Sep 13 11:31:00 cho sshd[2812132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.155.173.186  user=root
Sep 13 11:31:02 cho sshd[2812132]: Failed password for root from 45.155.173.186 port 55976 ssh2
...
2020-09-13 18:08:59
64.225.47.162 attackspam
Port scan denied
2020-09-13 18:18:29
200.70.56.204 attackbotsspam
Automatic report - Banned IP Access
2020-09-13 17:56:25
203.130.242.68 attackspam
2020-09-13T13:12:09.751893hostname sshd[40064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.130.242.68  user=root
2020-09-13T13:12:11.535687hostname sshd[40064]: Failed password for root from 203.130.242.68 port 38049 ssh2
...
2020-09-13 17:54:58

Recently Reported IPs

143.107.206.243 88.40.106.149 203.237.136.12 165.38.100.57
8.86.158.191 98.241.189.95 24.104.179.33 215.221.98.71
246.36.158.169 160.239.214.117 221.55.68.244 235.214.252.64
237.61.2.190 253.170.148.58 114.147.15.17 207.66.55.146
77.43.117.157 205.231.29.219 138.160.52.2 93.71.121.91