Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Phoenix

Region: Arizona

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.14.74.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62840
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.14.74.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025060400 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 04 20:01:16 CST 2025
;; MSG SIZE  rcvd: 104
Host info
80.74.14.20.in-addr.arpa domain name pointer azpdwsyzrjzg.stretchoid.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.74.14.20.in-addr.arpa	name = azpdwsyzrjzg.stretchoid.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.118.38.34 attack
Jul 31 11:42:41 mail postfix/smtpd\[29763\]: warning: unknown\[92.118.38.34\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 31 11:43:22 mail postfix/smtpd\[30106\]: warning: unknown\[92.118.38.34\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 31 12:13:50 mail postfix/smtpd\[31088\]: warning: unknown\[92.118.38.34\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 31 12:14:19 mail postfix/smtpd\[31998\]: warning: unknown\[92.118.38.34\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-31 18:16:50
139.59.20.248 attackspambots
Jul 31 09:11:07 MK-Soft-VM5 sshd\[27198\]: Invalid user notebook from 139.59.20.248 port 49188
Jul 31 09:11:07 MK-Soft-VM5 sshd\[27198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.20.248
Jul 31 09:11:09 MK-Soft-VM5 sshd\[27198\]: Failed password for invalid user notebook from 139.59.20.248 port 49188 ssh2
...
2019-07-31 17:45:25
185.100.87.207 attack
Jul 31 11:14:59 Ubuntu-1404-trusty-64-minimal sshd\[25884\]: Invalid user admin from 185.100.87.207
Jul 31 11:14:59 Ubuntu-1404-trusty-64-minimal sshd\[25884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.100.87.207
Jul 31 11:15:01 Ubuntu-1404-trusty-64-minimal sshd\[25884\]: Failed password for invalid user admin from 185.100.87.207 port 8561 ssh2
Jul 31 11:15:04 Ubuntu-1404-trusty-64-minimal sshd\[25884\]: Failed password for invalid user admin from 185.100.87.207 port 8561 ssh2
Jul 31 11:15:07 Ubuntu-1404-trusty-64-minimal sshd\[26016\]: Invalid user cloudera from 185.100.87.207
Jul 31 11:15:07 Ubuntu-1404-trusty-64-minimal sshd\[26016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.100.87.207
2019-07-31 17:46:02
104.248.44.227 attack
Jun 21 00:31:29 ubuntu sshd[19769]: Failed password for invalid user kuai from 104.248.44.227 port 50366 ssh2
Jun 21 00:32:41 ubuntu sshd[19784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.44.227
Jun 21 00:32:43 ubuntu sshd[19784]: Failed password for invalid user pou from 104.248.44.227 port 36632 ssh2
2019-07-31 17:37:09
120.133.1.16 attackbotsspam
Jul 31 10:05:54 mail sshd[23948]: Invalid user cvs from 120.133.1.16
Jul 31 10:05:54 mail sshd[23948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.133.1.16
Jul 31 10:05:54 mail sshd[23948]: Invalid user cvs from 120.133.1.16
Jul 31 10:05:56 mail sshd[23948]: Failed password for invalid user cvs from 120.133.1.16 port 45886 ssh2
Jul 31 10:08:32 mail sshd[24311]: Invalid user dos from 120.133.1.16
...
2019-07-31 18:25:42
5.120.208.7 attackspambots
Unauthorized connection attempt from IP address 5.120.208.7 on Port 445(SMB)
2019-07-31 18:11:34
58.21.233.131 attackspambots
Jul 30 05:20:57 localhost kernel: [15722650.803195] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=58.21.233.131 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=4846 PROTO=TCP SPT=43378 DPT=52869 SEQ=758669438 ACK=0 WINDOW=32295 RES=0x00 SYN URGP=0 
Jul 31 04:08:05 localhost kernel: [15804678.901127] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=58.21.233.131 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=49278 PROTO=TCP SPT=54905 DPT=52869 WINDOW=32295 RES=0x00 SYN URGP=0 
Jul 31 04:08:05 localhost kernel: [15804678.901136] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=58.21.233.131 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=49278 PROTO=TCP SPT=54905 DPT=52869 SEQ=758669438 ACK=0 WINDOW=32295 RES=0x00 SYN URGP=0
2019-07-31 18:49:55
171.224.223.85 attackspam
Brute force attempt
2019-07-31 18:23:38
223.27.212.187 attack
Unauthorized connection attempt from IP address 223.27.212.187 on Port 445(SMB)
2019-07-31 18:51:56
180.126.230.95 attack
20 attempts against mh-ssh on pluto.magehost.pro
2019-07-31 17:57:17
165.227.182.180 attackspambots
schuetzenmusikanten.de 165.227.182.180 \[31/Jul/2019:10:08:15 +0200\] "POST /wp-login.php HTTP/1.1" 200 5449 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
schuetzenmusikanten.de 165.227.182.180 \[31/Jul/2019:10:08:17 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4114 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-31 18:38:03
111.83.104.94 attackspam
Unauthorized connection attempt from IP address 111.83.104.94 on Port 445(SMB)
2019-07-31 18:39:37
180.105.128.160 spam
spam  wurde vom Hoster gemeldet als Spam
2019-07-31 17:49:28
172.119.142.110 attack
mail.log:Jul 31 07:14:58 mail postfix/smtpd[7956]: warning: cpe-172-119-142-110.socal.res.rr.com[172.119.142.110]: SASL PLAIN authentication failed: authentication failure
2019-07-31 17:56:50
112.85.42.237 attackbotsspam
Jul 31 12:08:11 piServer sshd\[25047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Jul 31 12:08:13 piServer sshd\[25047\]: Failed password for root from 112.85.42.237 port 49630 ssh2
Jul 31 12:08:15 piServer sshd\[25047\]: Failed password for root from 112.85.42.237 port 49630 ssh2
Jul 31 12:08:17 piServer sshd\[25047\]: Failed password for root from 112.85.42.237 port 49630 ssh2
Jul 31 12:10:54 piServer sshd\[25281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
...
2019-07-31 18:16:17

Recently Reported IPs

43.156.124.99 163.61.206.46 36.41.67.236 192.168.3.162
1.14.49.52 13.92.173.9 81.29.134.51 35.204.157.49
230.20.32.4 183.36.35.207 220.47.143.78 125.42.4.204
185.193.48.202 209.38.214.227 170.106.180.153 157.148.103.106
23.234.119.211 34.22.205.203 196.251.86.226 165.232.180.145