Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.74.165.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57726
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.74.165.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 12:57:04 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 3.165.74.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.165.74.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
176.107.130.183 attack
11/10/2019-11:55:52.319560 176.107.130.183 Protocol: 17 ET SCAN Sipvicious Scan
2019-11-11 02:43:45
159.203.201.191 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 56758 proto: TCP cat: Misc Attack
2019-11-11 02:44:16
81.22.45.187 attackbots
81.22.45.187 was recorded 74 times by 20 hosts attempting to connect to the following ports: 10389,32000,29000,19000,8888,50099,11111,4100,18828,12580,17000,8956,3311,56588,54321,26000,9001,8009,4002,3900,18000,24000,16000,3344,3321,443,25000,28000,7766,9989,51888,22000,27000,10087,8933,1218,56000,53000,55000,40000,8090,22222,59000,8001,1111,10090,36000,50000,6699,10098,58000,10086,42000,9090,30000,9002. Incident counter (4h, 24h, all-time): 74, 430, 853
2019-11-11 02:51:57
80.82.64.127 attackspambots
firewall-block, port(s): 5544/tcp, 33589/tcp
2019-11-11 02:28:17
59.144.137.134 attackbots
2019-11-10T17:10:48.128997abusebot-2.cloudsearch.cf sshd\[18800\]: Invalid user 123456 from 59.144.137.134 port 35174
2019-11-11 02:29:56
89.248.162.168 attack
Port Scan: TCP/5678
2019-11-11 02:24:04
193.188.22.216 attackbots
ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 1000 proto: TCP cat: Attempted Information Leak
2019-11-11 02:37:32
60.172.5.98 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 51 - port: 23 proto: TCP cat: Misc Attack
2019-11-11 02:55:05
5.188.206.14 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 6 - port: 55000 proto: TCP cat: Misc Attack
2019-11-11 02:34:03
198.108.67.59 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 2082 proto: TCP cat: Misc Attack
2019-11-11 02:36:15
185.176.27.38 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-11 02:40:29
217.174.254.186 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-11-11 02:35:03
185.209.0.58 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 8829 proto: TCP cat: Misc Attack
2019-11-11 02:38:20
80.82.77.245 attackspambots
80.82.77.245 was recorded 75 times by 29 hosts attempting to connect to the following ports: 997,1022,1026. Incident counter (4h, 24h, all-time): 75, 371, 2331
2019-11-11 02:27:06
89.248.168.202 attack
slow and persistent scanner
2019-11-11 02:49:55

Recently Reported IPs

68.233.72.233 194.100.215.218 62.67.152.231 143.236.251.12
137.176.0.145 51.172.148.170 209.78.51.137 184.40.63.2
186.90.151.24 47.105.219.167 242.176.182.139 16.73.179.133
84.120.187.211 151.198.126.96 88.26.97.234 150.223.67.245
212.143.79.56 65.145.0.108 64.110.120.66 161.209.42.206