Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Surabaya

Region: East Java

Country: Indonesia

Internet Service Provider: Esia

Hostname: unknown

Organization: PT Telekomunikasi Indonesia

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 36.74.189.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53424
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;36.74.189.107.			IN	A

;; AUTHORITY SECTION:
.			2910	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051000 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri May 10 18:48:31 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 107.189.74.36.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.3, trying next server
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 107.189.74.36.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
106.12.91.36 attack
Invalid user sz from 106.12.91.36 port 47834
2020-04-21 22:25:47
73.164.118.33 attackspambots
Invalid user yc from 73.164.118.33 port 5610
2020-04-21 22:35:27
111.230.89.105 attackspam
Invalid user tester from 111.230.89.105 port 47510
2020-04-21 22:20:37
187.111.211.14 attack
trying to login to mikrotik from zyxel device
2020-04-21 22:30:20
110.78.138.13 attack
Invalid user admin from 110.78.138.13 port 40951
2020-04-21 22:21:50
92.51.56.12 attackspam
Invalid user admin from 92.51.56.12 port 46478
2020-04-21 22:30:18
106.12.139.137 attackspambots
Apr 21 15:11:37 pve1 sshd[12234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.139.137 
Apr 21 15:11:39 pve1 sshd[12234]: Failed password for invalid user mysql from 106.12.139.137 port 34914 ssh2
...
2020-04-21 22:24:46
109.105.0.130 attackbotsspam
Invalid user postgres3 from 109.105.0.130 port 39176
2020-04-21 22:22:30
46.0.203.166 attack
Invalid user postgres from 46.0.203.166 port 34988
2020-04-21 22:43:45
51.68.142.10 attack
Invalid user admin7 from 51.68.142.10 port 60678
2020-04-21 22:41:34
218.39.226.115 attack
2020-04-21T15:18:55.410085vps751288.ovh.net sshd\[18410\]: Invalid user em from 218.39.226.115 port 42870
2020-04-21T15:18:55.418419vps751288.ovh.net sshd\[18410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.39.226.115
2020-04-21T15:18:56.922749vps751288.ovh.net sshd\[18410\]: Failed password for invalid user em from 218.39.226.115 port 42870 ssh2
2020-04-21T15:23:15.431268vps751288.ovh.net sshd\[18420\]: Invalid user ip from 218.39.226.115 port 54068
2020-04-21T15:23:15.439992vps751288.ovh.net sshd\[18420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.39.226.115
2020-04-21 22:56:39
113.173.170.97 attack
Invalid user admin from 113.173.170.97 port 42960
2020-04-21 22:18:19
209.121.162.20 attackbotsspam
Invalid user hr from 209.121.162.20 port 36970
2020-04-21 22:59:36
187.111.211.14 attack
trying to login to mikrotik from zyxel device
2020-04-21 22:30:12
52.224.69.165 attack
Invalid user admin from 52.224.69.165 port 30626
2020-04-21 22:38:21

Recently Reported IPs

52.56.240.36 125.202.65.191 159.31.23.144 121.238.223.190
110.78.140.3 87.67.237.235 123.201.195.220 104.252.176.2
210.61.206.34 24.112.72.33 167.220.234.197 36.13.139.7
123.139.42.183 109.47.171.34 88.250.25.153 12.101.212.23
123.139.42.184 168.23.139.195 74.82.47.17 185.105.225.35