Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Uppsala

Region: Uppsala

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.140.113.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50984
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;217.140.113.74.			IN	A

;; AUTHORITY SECTION:
.			571	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090200 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 02 19:23:12 CST 2020
;; MSG SIZE  rcvd: 118
Host info
74.113.140.217.in-addr.arpa domain name pointer c74-113.oskarnet.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
74.113.140.217.in-addr.arpa	name = c74-113.oskarnet.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.134.231.96 attack
abasicmove.de 91.134.231.96 \[05/Jul/2019:15:06:45 +0200\] "POST /wp-login.php HTTP/1.1" 200 5755 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
abasicmove.de 91.134.231.96 \[05/Jul/2019:15:06:46 +0200\] "POST /wp-login.php HTTP/1.1" 200 5558 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-05 23:52:16
202.83.58.138 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-05 23:03:18
200.23.235.63 attack
mail.log:Jun 27 11:31:24 mail postfix/smtpd[429]: warning: unknown[200.23.235.63]: SASL PLAIN authentication failed: authentication failure
2019-07-05 23:15:07
218.92.0.132 attackspambots
Jul  5 14:43:19 meumeu sshd[11421]: Failed password for root from 218.92.0.132 port 41719 ssh2
Jul  5 14:43:32 meumeu sshd[11421]: Failed password for root from 218.92.0.132 port 41719 ssh2
Jul  5 14:43:35 meumeu sshd[11421]: Failed password for root from 218.92.0.132 port 41719 ssh2
Jul  5 14:43:36 meumeu sshd[11421]: error: maximum authentication attempts exceeded for root from 218.92.0.132 port 41719 ssh2 [preauth]
...
2019-07-05 22:59:38
60.191.135.138 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 06:25:13,706 INFO [amun_request_handler] PortScan Detected on Port: 445 (60.191.135.138)
2019-07-05 23:49:04
192.169.232.246 attackbotsspam
Automatic report - Web App Attack
2019-07-05 23:47:05
198.100.145.189 attack
Time:     Fri Jul  5 04:17:26 2019 -0400
IP:       198.100.145.189 (CA/Canada/ns503219.ip-198-100-145.net)
Failures: 5 (mod_security)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_MODSEC]

Log entries:

[Fri Jul 05 03:52:59.891130 2019] [:error] [pid 63204:tid 47459091883776] [client 198.100.145.189:12554] [client 198.100.145.189] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at IP. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "5967"] [id "240335"] [rev "5"] [msg "COMODO WAF: XML-RPC Attack Identified (CVE-2013-0235)|Source 198.100.145.189 (0+1 hits since last alert)|www.appprivacidade.com.br|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "www.appprivacidade.com.br"] [uri "/xmlrpc.php"] [unique_id "XR8B2707EEY6VgK2lCXATAAAANE"]
[Fri Jul 05 04:06:41.631492 2019] [:error] [pid 62561:tid 47459089782528] [client 198.100.145.189:36218] [client 198.100.145.189] ModSecurity: Access denied with code 403
2019-07-05 23:18:16
106.12.196.196 attackbotsspam
Jul  5 13:49:11 fr01 sshd[11846]: Invalid user qia from 106.12.196.196
Jul  5 13:49:11 fr01 sshd[11846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.196.196
Jul  5 13:49:11 fr01 sshd[11846]: Invalid user qia from 106.12.196.196
Jul  5 13:49:13 fr01 sshd[11846]: Failed password for invalid user qia from 106.12.196.196 port 47074 ssh2
Jul  5 14:01:15 fr01 sshd[13882]: Invalid user desdev from 106.12.196.196
...
2019-07-05 23:15:38
197.156.67.226 attackspam
*Port Scan* detected from 197.156.67.226 (ET/Ethiopia/-). 4 hits in the last 30 seconds
2019-07-05 22:56:33
46.3.96.71 attackspambots
firewall-block, port(s): 41665/tcp, 41674/tcp, 41679/tcp
2019-07-05 23:50:07
186.237.91.56 attack
DATE:2019-07-05 09:54:08, IP:186.237.91.56, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-07-05 23:40:40
196.61.8.118 attackspam
3389BruteforceFW21
2019-07-05 23:44:14
87.10.205.207 attackbots
Jul  5 14:49:25 animalibera sshd[9787]: Invalid user simon from 87.10.205.207 port 62914
...
2019-07-05 23:14:08
193.77.124.237 attackbotsspam
client 193.77.124.237 [domain redacted] [403] [/apache/20190705/20190705-0851/20190705-085115-XR7zY23NIdUAAGakpXwAAADV]  Upload Malware Scanner: Malicious File upload attempt detected and blocked
client 193.77.124.237 [domain redacted] [403] [/apache/20190705/20190705-0851/20190705-085115-XR7zY23NIdUAAB306ZsAAAAV]  WAF Rules: Attack Blocked -  PHP function in Argument - this may be an attack
2019-07-05 23:28:43
103.91.94.237 attack
Automatic report - Web App Attack
2019-07-05 23:22:01

Recently Reported IPs

64.227.22.121 110.235.96.22 205.183.41.15 20.5.31.15
103.90.186.75 219.219.121.88 213.153.243.132 90.191.30.30
153.132.123.144 179.29.138.191 191.207.113.117 173.196.61.31
81.90.160.75 178.128.252.77 93.137.138.6 109.199.252.15
14.140.191.104 103.145.12.225 201.17.176.75 104.248.57.107