Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Melbourne

Region: Victoria

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.147.49.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43641
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.147.49.74.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 12:34:50 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 74.49.147.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 74.49.147.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.85.138.106 attack
Unauthorized connection attempt from IP address 219.85.138.106 on Port 445(SMB)
2020-06-02 02:57:50
136.243.208.164 attackbotsspam
Scanned 64 unique addresses for 1 unique ports in 24 hours (ports 80)
2020-06-02 03:10:43
185.34.192.99 attackspambots
Subject: Confirming - Aviso de pago
Date: Mon, 01 Jun 2020 11:46:50 +0100
Message ID: <95bc4bb86f5fe668e5983221978b4778@webmail.haciendaalmanzora.com>
Virus/Unauthorized code: >>> Possible MalWare 'W32.Generic' found in '16826957_7X_AR_PA6__33366876558.exe'.
2020-06-02 03:07:20
152.170.65.133 attack
2020-06-01T16:49:17.610919v22018076590370373 sshd[10833]: Failed password for root from 152.170.65.133 port 49960 ssh2
2020-06-01T16:49:55.808008v22018076590370373 sshd[25862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.170.65.133  user=root
2020-06-01T16:49:58.032183v22018076590370373 sshd[25862]: Failed password for root from 152.170.65.133 port 56816 ssh2
2020-06-01T16:50:34.340213v22018076590370373 sshd[6161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.170.65.133  user=root
2020-06-01T16:50:35.917023v22018076590370373 sshd[6161]: Failed password for root from 152.170.65.133 port 35438 ssh2
...
2020-06-02 02:59:39
80.240.253.212 attack
Unauthorized connection attempt from IP address 80.240.253.212 on Port 445(SMB)
2020-06-02 02:45:20
40.72.97.22 attack
failed root login
2020-06-02 03:18:02
95.172.50.199 attackspambots
port scan and connect, tcp 23 (telnet)
2020-06-02 03:15:26
74.82.47.53 attackbotsspam
 TCP (SYN) 74.82.47.53:60658 -> port 11211, len 44
2020-06-02 03:10:55
58.56.140.214 attack
Unauthorized connection attempt from IP address 58.56.140.214 on Port 445(SMB)
2020-06-02 03:17:09
192.71.142.35 attackbots
REQUESTED PAGE: /
2020-06-02 02:42:18
181.47.117.20 attackbots
Unauthorized connection attempt from IP address 181.47.117.20 on Port 445(SMB)
2020-06-02 02:45:53
189.16.233.194 attackspambots
Unauthorized connection attempt from IP address 189.16.233.194 on Port 445(SMB)
2020-06-02 02:53:31
186.216.209.99 attackspambots
Unauthorized connection attempt from IP address 186.216.209.99 on Port 445(SMB)
2020-06-02 02:39:48
178.45.42.69 attackbots
Unauthorized connection attempt from IP address 178.45.42.69 on Port 445(SMB)
2020-06-02 02:59:22
59.89.10.74 attackbots
Unauthorized connection attempt from IP address 59.89.10.74 on Port 445(SMB)
2020-06-02 02:43:56

Recently Reported IPs

77.103.60.163 245.238.203.248 186.124.70.101 193.77.159.58
72.128.218.147 175.205.43.250 38.239.32.133 31.50.87.109
238.66.165.141 243.246.242.87 92.39.106.44 20.106.145.73
169.193.159.77 252.40.136.139 239.106.127.153 181.56.45.102
134.93.88.101 155.222.189.212 113.95.191.137 238.224.124.209