Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cedar Knolls

Region: New Jersey

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.105.22.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52295
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;74.105.22.146.			IN	A

;; AUTHORITY SECTION:
.			560	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022901 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 01 06:25:24 CST 2020
;; MSG SIZE  rcvd: 117
Host info
146.22.105.74.in-addr.arpa domain name pointer static-74-105-22-146.nwrknj.fios.verizon.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
146.22.105.74.in-addr.arpa	name = static-74-105-22-146.nwrknj.fios.verizon.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.155.39.111 attackbots
2020-07-17T20:28:36.590124shield sshd\[8022\]: Invalid user cloud from 139.155.39.111 port 44468
2020-07-17T20:28:36.600382shield sshd\[8022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.39.111
2020-07-17T20:28:38.776266shield sshd\[8022\]: Failed password for invalid user cloud from 139.155.39.111 port 44468 ssh2
2020-07-17T20:34:10.044398shield sshd\[8563\]: Invalid user ftpweb from 139.155.39.111 port 57772
2020-07-17T20:34:10.060377shield sshd\[8563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.39.111
2020-07-18 04:42:47
3.12.221.96 attack
SSH Bruteforce attempt
2020-07-18 04:42:00
152.136.101.207 attackbots
Jul 17 22:34:15 vps647732 sshd[16615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.101.207
Jul 17 22:34:17 vps647732 sshd[16615]: Failed password for invalid user xcc from 152.136.101.207 port 36722 ssh2
...
2020-07-18 04:35:33
131.117.150.106 attackbotsspam
Jul 17 22:34:15 rancher-0 sshd[417321]: Invalid user reach from 131.117.150.106 port 42816
...
2020-07-18 04:37:28
45.143.223.109 attackbotsspam
2020-07-17 22:21:14,087 [snip] proftpd[25134] [snip] (45.143.223.109[45.143.223.109]): USER fake: no such user found from 45.143.223.109 [45.143.223.109] to ::ffff:[snip]:22
2020-07-17 22:21:14,378 [snip] proftpd[25135] [snip] (45.143.223.109[45.143.223.109]): USER admin: no such user found from 45.143.223.109 [45.143.223.109] to ::ffff:[snip]:22
2020-07-17 22:21:14,707 [snip] proftpd[25136] [snip] (45.143.223.109[45.143.223.109]): USER root: no such user found from 45.143.223.109 [45.143.223.109] to ::ffff:[snip]:22
2020-07-17 22:21:14,996 [snip] proftpd[25137] [snip] (45.143.223.109[45.143.223.109]): USER ubnt: no such user found from 45.143.223.109 [45.143.223.109] to ::ffff:[snip]:22
2020-07-17 22:21:15,287 [snip] proftpd[25138] [snip] (45.143.223.109[45.143.223.109]): USER guest: no such user found from 45.143.223.109 [45.143.223.109] to ::ffff:[snip]:22[...]
2020-07-18 04:26:33
93.148.93.172 attackspambots
Automatic report - XMLRPC Attack
2020-07-18 04:22:09
140.206.157.242 attackspambots
DATE:2020-07-17 22:34:13,IP:140.206.157.242,MATCHES:10,PORT:ssh
2020-07-18 04:39:05
207.154.229.50 attackbots
Jul 17 22:12:25 pornomens sshd\[18612\]: Invalid user csmith from 207.154.229.50 port 33188
Jul 17 22:12:25 pornomens sshd\[18612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50
Jul 17 22:12:27 pornomens sshd\[18612\]: Failed password for invalid user csmith from 207.154.229.50 port 33188 ssh2
...
2020-07-18 04:18:16
201.91.201.114 attackbots
Honeypot attack, port: 445, PTR: 201-91-201-114.customer.tdatabrasil.net.br.
2020-07-18 04:48:10
182.18.5.201 attackbotsspam
Port probing on unauthorized port 1433
2020-07-18 04:12:30
212.60.21.177 attackspambots
Forbidden access
2020-07-18 04:09:32
92.246.76.145 attackspam
RDP Bruteforce
2020-07-18 04:14:22
186.222.178.53 attack
Jul 17 17:31:57 ws12vmsma01 sshd[22085]: Invalid user ead from 186.222.178.53
Jul 17 17:31:58 ws12vmsma01 sshd[22085]: Failed password for invalid user ead from 186.222.178.53 port 63122 ssh2
Jul 17 17:33:04 ws12vmsma01 sshd[22902]: Invalid user ead from 186.222.178.53
...
2020-07-18 04:35:22
210.105.101.222 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-07-18 04:36:55
128.0.129.192 attackspambots
Jul 17 16:27:22 NPSTNNYC01T sshd[1144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.0.129.192
Jul 17 16:27:24 NPSTNNYC01T sshd[1144]: Failed password for invalid user info from 128.0.129.192 port 54014 ssh2
Jul 17 16:34:07 NPSTNNYC01T sshd[1753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.0.129.192
...
2020-07-18 04:47:35

Recently Reported IPs

186.199.122.228 64.79.33.220 52.57.224.111 124.45.58.9
100.131.101.228 189.213.128.228 207.228.180.87 12.77.40.169
78.195.253.46 112.122.242.152 189.4.105.33 175.110.70.86
187.178.30.143 185.44.229.23 211.222.126.145 182.162.218.81
194.144.100.130 160.137.233.205 179.218.163.117 210.151.121.181