Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Homer

Region: Alaska

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 65.74.104.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44348
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;65.74.104.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 13:51:01 CST 2025
;; MSG SIZE  rcvd: 106
Host info
138.104.74.65.in-addr.arpa domain name pointer 138-104-74-65.gci.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.104.74.65.in-addr.arpa	name = 138-104-74-65.gci.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.182 attackbots
2019-11-27T16:27:28.839760homeassistant sshd[10983]: Failed password for root from 218.92.0.182 port 29168 ssh2
2019-11-28T16:01:47.241421homeassistant sshd[24680]: Failed none for root from 218.92.0.182 port 9300 ssh2
2019-11-28T16:01:47.509374homeassistant sshd[24680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.182  user=root
...
2019-11-29 00:01:59
27.117.119.126 attack
Unauthorised access (Nov 28) SRC=27.117.119.126 LEN=40 TTL=49 ID=20401 TCP DPT=8080 WINDOW=52944 SYN
2019-11-28 23:36:12
187.188.193.211 attack
Nov 28 16:14:17 legacy sshd[31666]: Failed password for root from 187.188.193.211 port 60854 ssh2
Nov 28 16:18:53 legacy sshd[31785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.193.211
Nov 28 16:18:55 legacy sshd[31785]: Failed password for invalid user ident from 187.188.193.211 port 40612 ssh2
...
2019-11-28 23:33:32
49.234.51.56 attackspambots
Nov 28 15:40:48 amit sshd\[16664\]: Invalid user wwwrun from 49.234.51.56
Nov 28 15:40:48 amit sshd\[16664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.51.56
Nov 28 15:40:50 amit sshd\[16664\]: Failed password for invalid user wwwrun from 49.234.51.56 port 33970 ssh2
...
2019-11-28 23:27:12
218.92.0.168 attackspambots
2019-11-28T15:20:33.661922abusebot-2.cloudsearch.cf sshd\[4095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168  user=root
2019-11-28 23:22:43
197.248.2.229 attackspam
Nov 28 09:39:52 Tower sshd[5515]: Connection from 197.248.2.229 port 48991 on 192.168.10.220 port 22
Nov 28 09:40:10 Tower sshd[5515]: Invalid user sunday from 197.248.2.229 port 48991
Nov 28 09:40:10 Tower sshd[5515]: error: Could not get shadow information for NOUSER
Nov 28 09:40:10 Tower sshd[5515]: Failed password for invalid user sunday from 197.248.2.229 port 48991 ssh2
Nov 28 09:40:14 Tower sshd[5515]: Received disconnect from 197.248.2.229 port 48991:11: Bye Bye [preauth]
Nov 28 09:40:14 Tower sshd[5515]: Disconnected from invalid user sunday 197.248.2.229 port 48991 [preauth]
2019-11-28 23:34:28
218.92.0.189 attack
Nov 28 16:16:32 legacy sshd[31708]: Failed password for root from 218.92.0.189 port 57956 ssh2
Nov 28 16:18:38 legacy sshd[31778]: Failed password for root from 218.92.0.189 port 61576 ssh2
...
2019-11-28 23:21:16
193.169.253.86 attackbotsspam
" "
2019-11-28 23:21:43
112.85.42.227 attack
Nov 28 10:25:35 TORMINT sshd\[17756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
Nov 28 10:25:37 TORMINT sshd\[17756\]: Failed password for root from 112.85.42.227 port 43288 ssh2
Nov 28 10:27:47 TORMINT sshd\[17978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
...
2019-11-28 23:38:35
41.77.145.34 attack
Nov 28 07:14:12 mockhub sshd[3059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.145.34
Nov 28 07:14:14 mockhub sshd[3059]: Failed password for invalid user pork from 41.77.145.34 port 3091 ssh2
...
2019-11-28 23:19:35
222.186.175.163 attackspam
Nov 28 10:39:02 plusreed sshd[1047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
Nov 28 10:39:04 plusreed sshd[1047]: Failed password for root from 222.186.175.163 port 37952 ssh2
...
2019-11-28 23:42:03
112.85.42.175 attackspambots
$f2bV_matches
2019-11-28 23:39:04
112.85.42.171 attackspam
Nov 28 16:42:04 dedicated sshd[17352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.171  user=root
Nov 28 16:42:06 dedicated sshd[17352]: Failed password for root from 112.85.42.171 port 47760 ssh2
2019-11-28 23:48:32
132.148.148.21 attackspam
Automatic report - XMLRPC Attack
2019-11-28 23:56:58
139.219.6.50 attackbotsspam
firewall-block, port(s): 40864/tcp
2019-11-28 23:45:23

Recently Reported IPs

195.237.102.29 115.242.131.92 126.63.2.172 185.109.21.195
2.133.28.188 237.33.96.83 83.241.183.82 168.147.30.245
201.157.53.70 97.243.202.174 61.211.107.76 127.220.202.191
245.176.76.172 180.45.244.75 47.13.64.94 63.232.209.91
140.130.81.231 153.120.237.209 249.31.194.139 94.5.74.192