Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Somerset

Region: Kentucky

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.139.66.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52955
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;74.139.66.189.			IN	A

;; AUTHORITY SECTION:
.			138	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020102501 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 26 03:50:35 CST 2020
;; MSG SIZE  rcvd: 117
Host info
189.66.139.74.in-addr.arpa domain name pointer cpe-74-139-66-189.kya.res.rr.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.66.139.74.in-addr.arpa	name = cpe-74-139-66-189.kya.res.rr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
197.231.221.211 attackbotsspam
Mar 22 21:25:54 ms-srv sshd[65088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.231.221.211
Mar 22 21:25:57 ms-srv sshd[65088]: Failed password for invalid user ubnt from 197.231.221.211 port 15716 ssh2
2020-03-10 09:10:48
122.51.190.65 attack
2020-03-09T22:04:40.491805homeassistant sshd[15705]: Invalid user oleta from 122.51.190.65 port 57600
2020-03-09T22:04:40.505032homeassistant sshd[15705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.190.65
...
2020-03-10 08:58:00
95.49.81.128 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/95.49.81.128/ 
 
 PL - 1H : (38)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN5617 
 
 IP : 95.49.81.128 
 
 CIDR : 95.48.0.0/14 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 5363456 
 
 
 ATTACKS DETECTED ASN5617 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 9 
 24H - 15 
 
 DateTime : 2020-03-10 04:56:37 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-10 12:03:13
165.16.39.65 attackspambots
Email rejected due to spam filtering
2020-03-10 08:56:12
197.243.48.10 attack
Dec  2 11:06:53 ms-srv sshd[39117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.243.48.10
Dec  2 11:06:55 ms-srv sshd[39117]: Failed password for invalid user test1 from 197.243.48.10 port 51599 ssh2
2020-03-10 08:57:42
222.186.175.148 attack
Mar 10 07:47:46 webhost01 sshd[18923]: Failed password for root from 222.186.175.148 port 31348 ssh2
Mar 10 07:47:59 webhost01 sshd[18923]: error: maximum authentication attempts exceeded for root from 222.186.175.148 port 31348 ssh2 [preauth]
...
2020-03-10 08:52:15
51.75.67.69 attack
Dec 11 13:30:14 woltan sshd[2231]: Failed password for invalid user GardenAdmin from 51.75.67.69 port 45794 ssh2
2020-03-10 08:57:31
111.229.3.73 attack
Feb 15 00:01:54 woltan sshd[26819]: Failed password for invalid user almacen from 111.229.3.73 port 57868 ssh2
2020-03-10 09:10:01
82.118.242.76 attackbots
DATE:2020-03-09 22:11:45, IP:82.118.242.76, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-03-10 08:50:25
197.248.205.53 attackspambots
Sep 14 18:35:07 ms-srv sshd[19417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.205.53
Sep 14 18:35:09 ms-srv sshd[19417]: Failed password for invalid user ralph from 197.248.205.53 port 56894 ssh2
2020-03-10 08:50:00
197.220.6.90 attackbots
Mar  1 08:55:33 ms-srv sshd[42610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.220.6.90
Mar  1 08:55:35 ms-srv sshd[42610]: Failed password for invalid user admin from 197.220.6.90 port 54395 ssh2
2020-03-10 09:17:18
49.88.112.115 attack
Mar  9 14:46:11 kapalua sshd\[26156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Mar  9 14:46:12 kapalua sshd\[26156\]: Failed password for root from 49.88.112.115 port 40772 ssh2
Mar  9 14:47:10 kapalua sshd\[26220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Mar  9 14:47:12 kapalua sshd\[26220\]: Failed password for root from 49.88.112.115 port 14788 ssh2
Mar  9 14:48:04 kapalua sshd\[26293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
2020-03-10 08:59:18
197.220.22.104 attackspam
Apr  3 15:06:57 ms-srv sshd[13601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.220.22.104
Apr  3 15:07:00 ms-srv sshd[13601]: Failed password for invalid user admin from 197.220.22.104 port 59826 ssh2
2020-03-10 09:20:31
197.235.10.121 attackspambots
Mar  9 05:17:37 ms-srv sshd[40892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.235.10.121
Mar  9 05:17:39 ms-srv sshd[40892]: Failed password for invalid user postgres from 197.235.10.121 port 59696 ssh2
2020-03-10 09:06:27
197.235.205.149 attackbots
Jan 11 13:37:40 ms-srv sshd[38114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.235.205.149
Jan 11 13:37:42 ms-srv sshd[38114]: Failed password for invalid user info from 197.235.205.149 port 52494 ssh2
2020-03-10 09:04:21

Recently Reported IPs

188.168.8.75 52.149.144.50 80.41.177.204 12.43.176.229
196.53.0.86 67.243.167.134 174.95.64.27 210.0.230.3
2.57.129.90 52.179.10.117 46.101.207.236 178.217.15.36
45.146.164.85 82.241.226.23 73.152.139.177 65.48.226.137
185.215.151.100 186.26.117.80 153.150.52.12 78.99.141.118