Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.74.22.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15074
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.74.22.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 21:29:09 CST 2025
;; MSG SIZE  rcvd: 104
Host info
45.22.74.52.in-addr.arpa domain name pointer ec2-52-74-22-45.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.22.74.52.in-addr.arpa	name = ec2-52-74-22-45.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.213.162.148 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 20:40:44
185.173.35.25 attack
ICMP MH Probe, Scan /Distributed -
2020-02-18 20:41:18
49.206.230.231 attack
Automatic report - Port Scan Attack
2020-02-18 21:06:48
62.89.206.34 attackspam
Automatic report - Port Scan Attack
2020-02-18 20:49:01
209.17.96.210 attackbots
W 31101,/var/log/nginx/access.log,-,-
2020-02-18 21:07:12
118.89.25.35 attackspambots
2020-02-18T05:44:29.442024  sshd[20991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.25.35  user=root
2020-02-18T05:44:31.356706  sshd[20991]: Failed password for root from 118.89.25.35 port 37680 ssh2
2020-02-18T05:48:22.943625  sshd[21124]: Invalid user ftptest from 118.89.25.35 port 32922
...
2020-02-18 21:15:27
36.68.84.100 attackspambots
1582014971 - 02/18/2020 09:36:11 Host: 36.68.84.100/36.68.84.100 Port: 445 TCP Blocked
2020-02-18 21:17:22
37.139.16.94 attackspambots
(sshd) Failed SSH login from 37.139.16.94 (NL/Netherlands/lukasklein.com): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 18 07:18:28 ubnt-55d23 sshd[26378]: Invalid user zabbix from 37.139.16.94 port 58191
Feb 18 07:18:30 ubnt-55d23 sshd[26378]: Failed password for invalid user zabbix from 37.139.16.94 port 58191 ssh2
2020-02-18 21:15:46
218.92.0.138 attackspambots
Feb 18 14:02:18 tuxlinux sshd[33726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
...
2020-02-18 21:05:33
51.75.70.30 attack
Feb 18 10:10:42 firewall sshd[23743]: Invalid user saturday from 51.75.70.30
Feb 18 10:10:44 firewall sshd[23743]: Failed password for invalid user saturday from 51.75.70.30 port 54990 ssh2
Feb 18 10:12:24 firewall sshd[23786]: Invalid user csgo from 51.75.70.30
...
2020-02-18 21:19:47
117.158.194.18 attackspambots
Invalid user daphne from 117.158.194.18 port 3773
2020-02-18 21:08:41
198.12.156.214 attack
Attempt to hack Wordpress Login, XMLRPC or other login
2020-02-18 20:53:12
49.193.199.122 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 21:18:31
222.186.15.33 attack
Feb 18 07:25:59 firewall sshd[18315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.33  user=root
Feb 18 07:26:00 firewall sshd[18315]: Failed password for root from 222.186.15.33 port 40873 ssh2
Feb 18 07:26:02 firewall sshd[18315]: Failed password for root from 222.186.15.33 port 40873 ssh2
...
2020-02-18 20:45:40
202.182.52.130 attack
2020-02-18T22:49:41.562789luisaranguren sshd[3123095]: Invalid user admin from 202.182.52.130 port 64491
2020-02-18T22:49:43.950529luisaranguren sshd[3123095]: Failed password for invalid user admin from 202.182.52.130 port 64491 ssh2
...
2020-02-18 20:42:49

Recently Reported IPs

167.97.41.12 188.217.142.67 33.178.244.77 79.179.107.151
67.198.9.63 198.149.87.121 137.45.186.43 147.106.10.31
77.195.247.184 24.214.65.241 176.231.163.142 229.238.60.124
239.193.106.192 191.32.246.29 152.121.99.253 51.244.195.94
178.175.184.207 49.198.21.159 161.201.147.253 7.85.69.131