Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.242.22.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63338
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;74.242.22.135.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 04:34:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 135.22.242.74.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.22.242.74.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.4.241.6 attackbotsspam
Invalid user ubuntu from 122.4.241.6 port 41590
2020-04-20 22:57:31
113.31.105.111 attack
Invalid user ec from 113.31.105.111 port 50870
2020-04-20 23:07:17
45.55.235.30 attackbots
SSH login attempts.
2020-04-20 23:32:05
106.52.115.36 attack
(sshd) Failed SSH login from 106.52.115.36 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 20 15:33:21 srv sshd[11294]: Invalid user admin from 106.52.115.36 port 42084
Apr 20 15:33:22 srv sshd[11294]: Failed password for invalid user admin from 106.52.115.36 port 42084 ssh2
Apr 20 16:00:04 srv sshd[12210]: Invalid user gj from 106.52.115.36 port 45052
Apr 20 16:00:06 srv sshd[12210]: Failed password for invalid user gj from 106.52.115.36 port 45052 ssh2
Apr 20 16:04:06 srv sshd[12370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.115.36  user=root
2020-04-20 23:10:57
69.28.235.203 attack
Apr 20 17:29:32 lukav-desktop sshd\[4522\]: Invalid user ftpuser from 69.28.235.203
Apr 20 17:29:32 lukav-desktop sshd\[4522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.28.235.203
Apr 20 17:29:34 lukav-desktop sshd\[4522\]: Failed password for invalid user ftpuser from 69.28.235.203 port 38641 ssh2
Apr 20 17:34:15 lukav-desktop sshd\[4703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.28.235.203  user=root
Apr 20 17:34:16 lukav-desktop sshd\[4703\]: Failed password for root from 69.28.235.203 port 47395 ssh2
2020-04-20 23:21:51
114.67.66.199 attackspambots
Invalid user test03 from 114.67.66.199 port 41548
2020-04-20 23:06:01
120.70.100.89 attackspambots
Apr 20 16:26:17 vpn01 sshd[29127]: Failed password for root from 120.70.100.89 port 45823 ssh2
...
2020-04-20 22:59:07
62.210.219.124 attackbotsspam
SSH login attempts.
2020-04-20 23:23:55
113.137.33.40 attackbots
Invalid user fr from 113.137.33.40 port 29701
2020-04-20 23:06:45
106.54.145.68 attackbots
Invalid user va from 106.54.145.68 port 41294
2020-04-20 23:10:05
51.75.140.153 attack
$f2bV_matches
2020-04-20 23:27:44
51.91.250.49 attack
Apr 20 14:08:32 server4-pi sshd[21211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.250.49 
Apr 20 14:08:34 server4-pi sshd[21211]: Failed password for invalid user gitlab-runner from 51.91.250.49 port 35148 ssh2
2020-04-20 23:26:40
94.72.87.171 attackspam
Apr 20 21:48:23 f sshd\[19418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.72.87.171
Apr 20 21:48:23 f sshd\[19419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.72.87.171
Apr 20 21:48:25 f sshd\[19418\]: Failed password for invalid user pi from 94.72.87.171 port 54288 ssh2
...
2020-04-20 23:16:47
81.29.192.212 attack
Multiple login attempts under user "admin"
2020-04-20 22:59:19
115.124.120.219 attackbotsspam
Apr 20 16:51:57 host sshd[24379]: Invalid user rig1 from 115.124.120.219 port 54281
...
2020-04-20 23:04:59

Recently Reported IPs

121.56.43.48 172.67.7.81 242.219.10.82 17.251.184.12
251.194.53.22 246.35.217.179 162.134.102.113 136.44.109.179
83.239.157.149 38.188.76.189 58.204.97.11 79.18.184.139
115.149.58.58 220.19.185.194 104.235.24.230 55.75.67.47
233.238.129.235 40.146.93.44 194.117.218.115 17.246.252.214