Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Toronto

Region: Ontario

Country: Canada

Internet Service Provider: Bell

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       74.12.0.0 - 74.15.255.255
CIDR:           74.12.0.0/14
NetName:        BELLNEXXIA-11
NetHandle:      NET-74-12-0-0-1
Parent:         NET74 (NET-74-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Bell Canada (LINX)
RegDate:        2006-01-19
Updated:        2006-04-10
Comment:        For abuse cases please use abuse@in.bell.ca
Ref:            https://rdap.arin.net/registry/ip/74.12.0.0



OrgName:        Bell Canada
OrgId:          LINX
Address:        160 Elgin Street
City:           Ottawa
StateProv:      ON
PostalCode:     K1G-3J4
Country:        CA
RegDate:        1990-03-09
Updated:        2026-04-09
Ref:            https://rdap.arin.net/registry/entity/LINX


OrgTechHandle: ANR1-ARIN
OrgTechName:   Automated Network Resolution
OrgTechPhone:  +1-877-877-2426 
OrgTechEmail:  bwnteam@bell.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/ANR1-ARIN

OrgAbuseHandle: ABUSE1127-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-877-877-2426 
OrgAbuseEmail:  abuse@bellnexxia.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE1127-ARIN

OrgRoutingHandle: IRRAD-ARIN
OrgRoutingName:   IRR Admin
OrgRoutingPhone:  +1-888-788-2355 
OrgRoutingEmail:  irr-admin@bell.ca
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IRRAD-ARIN

OrgAbuseHandle: ABAI1-ARIN
OrgAbuseName:   Abuse Business abuse issues
OrgAbusePhone:  +1-877-877-2426 
OrgAbuseEmail:  abuse@bellnexxia.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABAI1-ARIN

OrgTechHandle: DHANJ1-ARIN
OrgTechName:   Dhanji, Shaffiq 
OrgTechPhone:  +1-416-353-9801 
OrgTechEmail:  shaffiq.dhanji@bell.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/DHANJ1-ARIN

OrgTechHandle: SOCEV-ARIN
OrgTechName:   SOC-Events
OrgTechPhone:  +1-888-570-8125 
OrgTechEmail:  bellsoc@bell.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/SOCEV-ARIN

RTechHandle: PD135-ARIN
RTechName:   Daoust, Philippe 
RTechPhone:  +1-416-215-5423 
RTechEmail:  philippe.daoust@bell.ca
RTechRef:    https://rdap.arin.net/registry/entity/PD135-ARIN

# end


# start

NetRange:       74.14.121.0 - 74.14.121.255
CIDR:           74.14.121.0/24
NetName:        HSE-DYNAMIC-1689960361-CA
NetHandle:      NET-74-14-121-0-1
Parent:         BELLNEXXIA-11 (NET-74-12-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Sympatico HSE (C09854194)
RegDate:        2023-07-21
Updated:        2023-07-21
Comment:        For Abuse issues contact our abuse groups
Ref:            https://rdap.arin.net/registry/ip/74.14.121.0


CustName:       Sympatico HSE
Address:        31 FINCH AVENUE EAST
City:           TORONTO
StateProv:      ON
PostalCode:     M2N 4P9
Country:        CA
RegDate:        2023-07-21
Updated:        2023-07-21
Ref:            https://rdap.arin.net/registry/entity/C09854194

OrgTechHandle: ANR1-ARIN
OrgTechName:   Automated Network Resolution
OrgTechPhone:  +1-877-877-2426 
OrgTechEmail:  bwnteam@bell.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/ANR1-ARIN

OrgAbuseHandle: ABUSE1127-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-877-877-2426 
OrgAbuseEmail:  abuse@bellnexxia.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE1127-ARIN

OrgRoutingHandle: IRRAD-ARIN
OrgRoutingName:   IRR Admin
OrgRoutingPhone:  +1-888-788-2355 
OrgRoutingEmail:  irr-admin@bell.ca
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IRRAD-ARIN

OrgAbuseHandle: ABAI1-ARIN
OrgAbuseName:   Abuse Business abuse issues
OrgAbusePhone:  +1-877-877-2426 
OrgAbuseEmail:  abuse@bellnexxia.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABAI1-ARIN

OrgTechHandle: DHANJ1-ARIN
OrgTechName:   Dhanji, Shaffiq 
OrgTechPhone:  +1-416-353-9801 
OrgTechEmail:  shaffiq.dhanji@bell.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/DHANJ1-ARIN

OrgTechHandle: SOCEV-ARIN
OrgTechName:   SOC-Events
OrgTechPhone:  +1-888-570-8125 
OrgTechEmail:  bellsoc@bell.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/SOCEV-ARIN

RTechHandle: PD135-ARIN
RTechName:   Daoust, Philippe 
RTechPhone:  +1-416-215-5423 
RTechEmail:  philippe.daoust@bell.ca
RTechRef:    https://rdap.arin.net/registry/entity/PD135-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.14.121.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;74.14.121.217.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050701 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 08 04:28:14 CST 2026
;; MSG SIZE  rcvd: 106
Host info
217.121.14.74.in-addr.arpa domain name pointer bras-base-toroon4791w-grc-56-74-14-121-217.dsl.bell.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
217.121.14.74.in-addr.arpa	name = bras-base-toroon4791w-grc-56-74-14-121-217.dsl.bell.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
66.249.155.244 attack
Mar 24 19:26:45 host01 sshd[27464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.155.244 
Mar 24 19:26:47 host01 sshd[27464]: Failed password for invalid user e from 66.249.155.244 port 33162 ssh2
Mar 24 19:30:59 host01 sshd[28259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.155.244 
...
2020-03-25 03:57:12
79.3.6.207 attackbots
SSH invalid-user multiple login try
2020-03-25 03:41:18
51.68.84.36 attackbots
$f2bV_matches
2020-03-25 03:31:37
119.193.27.90 attackspam
Mar 25 01:01:26 areeb-Workstation sshd[20938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.193.27.90 
Mar 25 01:01:27 areeb-Workstation sshd[20938]: Failed password for invalid user denise from 119.193.27.90 port 49857 ssh2
...
2020-03-25 03:34:08
51.38.231.11 attackbots
Mar 24 19:34:35 v22019038103785759 sshd\[23357\]: Invalid user deploy from 51.38.231.11 port 41086
Mar 24 19:34:35 v22019038103785759 sshd\[23357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.231.11
Mar 24 19:34:37 v22019038103785759 sshd\[23357\]: Failed password for invalid user deploy from 51.38.231.11 port 41086 ssh2
Mar 24 19:44:23 v22019038103785759 sshd\[24059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.231.11  user=games
Mar 24 19:44:26 v22019038103785759 sshd\[24059\]: Failed password for games from 51.38.231.11 port 34402 ssh2
...
2020-03-25 03:59:40
164.163.2.5 attackbots
Mar 24 20:31:02 ArkNodeAT sshd\[6025\]: Invalid user jy from 164.163.2.5
Mar 24 20:31:02 ArkNodeAT sshd\[6025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.2.5
Mar 24 20:31:04 ArkNodeAT sshd\[6025\]: Failed password for invalid user jy from 164.163.2.5 port 41582 ssh2
2020-03-25 04:09:59
195.58.17.185 attack
Unauthorized connection attempt from IP address 195.58.17.185 on Port 445(SMB)
2020-03-25 03:32:05
176.100.166.249 attackspam
Unauthorized connection attempt from IP address 176.100.166.249 on Port 445(SMB)
2020-03-25 04:05:42
197.51.34.54 attackspam
Telnetd brute force attack detected by fail2ban
2020-03-25 03:48:14
27.128.240.247 attack
2020-03-24T19:20:42.365178struts4.enskede.local sshd\[18282\]: Invalid user resin from 27.128.240.247 port 46312
2020-03-24T19:20:42.370941struts4.enskede.local sshd\[18282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.240.247
2020-03-24T19:20:45.248425struts4.enskede.local sshd\[18282\]: Failed password for invalid user resin from 27.128.240.247 port 46312 ssh2
2020-03-24T19:29:46.187883struts4.enskede.local sshd\[18341\]: Invalid user dy from 27.128.240.247 port 46180
2020-03-24T19:29:46.194124struts4.enskede.local sshd\[18341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.240.247
...
2020-03-25 03:28:25
14.18.109.9 attackbotsspam
Mar 24 11:12:13 pixelmemory sshd[8560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.109.9
Mar 24 11:12:15 pixelmemory sshd[8560]: Failed password for invalid user svn from 14.18.109.9 port 48744 ssh2
Mar 24 11:30:48 pixelmemory sshd[11410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.109.9
...
2020-03-25 04:09:05
186.167.18.122 attack
Mar 24 15:22:12 firewall sshd[1034]: Invalid user wincelaus from 186.167.18.122
Mar 24 15:22:15 firewall sshd[1034]: Failed password for invalid user wincelaus from 186.167.18.122 port 50598 ssh2
Mar 24 15:30:53 firewall sshd[1708]: Invalid user vinay from 186.167.18.122
...
2020-03-25 04:02:28
37.53.101.226 attackbotsspam
Unauthorised access (Mar 24) SRC=37.53.101.226 LEN=40 TTL=247 ID=51555 DF TCP DPT=8080 WINDOW=14600 SYN
2020-03-25 03:52:42
119.153.178.32 attackspambots
Unauthorized connection attempt from IP address 119.153.178.32 on Port 445(SMB)
2020-03-25 03:28:59
213.102.79.17 attackbots
Telnetd brute force attack detected by fail2ban
2020-03-25 03:32:45

Recently Reported IPs

39.98.52.52 192.175.111.245 183.226.201.190 219.152.232.199
47.94.92.194 2606:4700:10::ac43:1822 2606:4700:10::6814:8832 2606:4700:10::6814:5482
34.129.114.59 14.213.29.230 2606:4700:10::6816:642 2606:4700:10::6814:7067
121.40.45.125 172.215.145.162 128.203.202.233 5.61.209.102
180.101.144.152 2606:4700:10::ac43:1628 2606:4700:10::ac43:1430 14.207.194.189