Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Monticello

Region: Arkansas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       74.122.220.0 - 74.122.223.255
CIDR:           74.122.220.0/22
NetName:        UAMONT
NetHandle:      NET-74-122-220-0-1
Parent:         NET74 (NET-74-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   University of Arkansas at Monticello (UAAM)
RegDate:        2010-02-24
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/74.122.220.0


OrgName:        University of Arkansas at Monticello
OrgId:          UAAM
Address:        P.O. Box 3626
City:           Monticello
StateProv:      AR
PostalCode:     71655
Country:        US
RegDate:        1991-06-21
Updated:        2023-01-20
Ref:            https://rdap.arin.net/registry/entity/UAAM


OrgDNSHandle: SYSTE514-ARIN
OrgDNSName:   SystemAdmin
OrgDNSPhone:  +1-870-460-1036 
OrgDNSEmail:  itdept@uamont.edu
OrgDNSRef:    https://rdap.arin.net/registry/entity/SYSTE514-ARIN

OrgNOCHandle: SYSTE514-ARIN
OrgNOCName:   SystemAdmin
OrgNOCPhone:  +1-870-460-1036 
OrgNOCEmail:  itdept@uamont.edu
OrgNOCRef:    https://rdap.arin.net/registry/entity/SYSTE514-ARIN

OrgTechHandle: SYSTE514-ARIN
OrgTechName:   SystemAdmin
OrgTechPhone:  +1-870-460-1036 
OrgTechEmail:  itdept@uamont.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/SYSTE514-ARIN

OrgRoutingHandle: SYSTE514-ARIN
OrgRoutingName:   SystemAdmin
OrgRoutingPhone:  +1-870-460-1036 
OrgRoutingEmail:  itdept@uamont.edu
OrgRoutingRef:    https://rdap.arin.net/registry/entity/SYSTE514-ARIN

OrgAbuseHandle: SYSTE514-ARIN
OrgAbuseName:   SystemAdmin
OrgAbusePhone:  +1-870-460-1036 
OrgAbuseEmail:  itdept@uamont.edu
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SYSTE514-ARIN

RNOCHandle: NETWO7221-ARIN
RNOCName:   NetworkAdmin
RNOCPhone:  +1-870-460-1036 
RNOCEmail:  itdept@uamont.edu
RNOCRef:    https://rdap.arin.net/registry/entity/NETWO7221-ARIN

RAbuseHandle: NETWO7221-ARIN
RAbuseName:   NetworkAdmin
RAbusePhone:  +1-870-460-1036 
RAbuseEmail:  itdept@uamont.edu
RAbuseRef:    https://rdap.arin.net/registry/entity/NETWO7221-ARIN

RTechHandle: NETWO7221-ARIN
RTechName:   NetworkAdmin
RTechPhone:  +1-870-460-1036 
RTechEmail:  itdept@uamont.edu
RTechRef:    https://rdap.arin.net/registry/entity/NETWO7221-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#'
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.122.221.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;74.122.221.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032400 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 14:25:05 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 213.221.122.74.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.221.122.74.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.54.111.227 attackspambots
8291/tcp
[2019-07-30]1pkt
2019-07-31 02:45:28
104.236.122.193 attackspambots
19/7/30@11:05:58: FAIL: IoT-SSH address from=104.236.122.193
...
2019-07-31 03:17:52
96.57.82.166 attackbots
$f2bV_matches
2019-07-31 03:18:22
212.92.106.106 attackbotsspam
212.92.106.106 - - [29/Jul/2019:12:03:52 +0300] "GET /wordpress/ HTTP/1.1" 404 208 "-" "Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0"
212.92.106.106 - - [29/Jul/2019:12:03:53 +0300] "GET /wp/ HTTP/1.1" 404 201 "-" "Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0"
212.92.106.106 - - [29/Jul/2019:12:03:53 +0300] "GET /blog/ HTTP/1.1" 404 203 "-" "Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0"
...
2019-07-31 03:06:56
221.195.234.108 attackbotsspam
Jul 30 10:33:19 xtremcommunity sshd\[25259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.195.234.108  user=root
Jul 30 10:33:21 xtremcommunity sshd\[25259\]: Failed password for root from 221.195.234.108 port 33058 ssh2
Jul 30 10:38:59 xtremcommunity sshd\[25436\]: Invalid user upload from 221.195.234.108 port 44204
Jul 30 10:38:59 xtremcommunity sshd\[25436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.195.234.108
Jul 30 10:39:01 xtremcommunity sshd\[25436\]: Failed password for invalid user upload from 221.195.234.108 port 44204 ssh2
...
2019-07-31 02:35:59
139.199.131.245 attackspam
30.07.2019 12:16:56 Web Distributed Authoring and Versioning server availability scan (webdav)
2019-07-31 02:33:15
104.155.52.215 attackspam
5900/tcp
[2019-07-30]1pkt
2019-07-31 02:28:03
134.209.61.78 attack
Jul 30 09:40:41 aat-srv002 sshd[12008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.61.78
Jul 30 09:40:43 aat-srv002 sshd[12008]: Failed password for invalid user arbaiah from 134.209.61.78 port 52542 ssh2
Jul 30 09:45:04 aat-srv002 sshd[12084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.61.78
Jul 30 09:45:07 aat-srv002 sshd[12084]: Failed password for invalid user salenews from 134.209.61.78 port 46418 ssh2
...
2019-07-31 03:15:27
183.80.89.94 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-31 02:44:54
218.92.0.186 attackbots
2019-07-30T17:46:40.880685abusebot.cloudsearch.cf sshd\[22355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.186  user=root
2019-07-31 03:10:38
178.128.221.237 attackbotsspam
$f2bV_matches
2019-07-31 02:53:01
36.236.35.7 attackbots
:
2019-07-31 02:53:57
123.120.29.150 attackspambots
23/tcp
[2019-07-30]1pkt
2019-07-31 02:48:22
52.80.52.242 attack
2019-07-30T19:01:12.294775abusebot-2.cloudsearch.cf sshd\[8262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-80-52-242.cn-north-1.compute.amazonaws.com.cn  user=root
2019-07-31 03:13:17
1.52.150.150 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-31 03:03:22

Recently Reported IPs

2606:4700:10::6814:5543 85.121.122.15 57.2.133.47 91.92.242.99
24.199.92.202 77.83.39.12 88.158.115.68 20.251.9.203
20.169.83.101 5.183.150.239 2606:4700:10::ac43:1570 2606:4700:10::6814:7963
2606:4700:10::6816:730 2606:4700:10::6816:4470 2606:4700:10::6816:2263 2606:4700:10::6814:8616
2606:4700:10::6814:8553 2606:4700:10::6814:8406 2606:4700:10::6814:5101 2606:4700:10::6816:4861