Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       74.48.0.0 - 74.49.127.255
CIDR:           74.49.0.0/17, 74.48.0.0/16
NetName:        TELUS-3
NetHandle:      NET-74-48-0-0-1
Parent:         NET74 (NET-74-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   TELUS Communications Inc. (TACE)
RegDate:        2006-02-09
Updated:        2021-07-15
Ref:            https://rdap.arin.net/registry/ip/74.48.0.0



OrgName:        TELUS Communications Inc.
OrgId:          TACE
Address:        510 W Georgia St
City:           Vancouver
StateProv:      BC
PostalCode:     V6B 2A3
Country:        CA
RegDate:        
Updated:        2025-07-09
Ref:            https://rdap.arin.net/registry/entity/TACE


OrgAbuseHandle: ABUSE9294-ARIN
OrgAbuseName:   Abuse Hunter
OrgAbusePhone:  +1-650-934-1667 
OrgAbuseEmail:  a3c46621-557a-4f0f-ad3b-d2c2f52183de@abusehunter.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9294-ARIN

OrgTechHandle: TBOTP-ARIN
OrgTechName:   TELUS BC ORG TECH POC
OrgTechPhone:  +1-877-310-8324 
OrgTechEmail:  IPadmin@telus.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TBOTP-ARIN

OrgAbuseHandle: AAT-ARIN
OrgAbuseName:   Abuse at TELUS
OrgAbusePhone:  +1-877-945-8220 
OrgAbuseEmail:  abuse@telus.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AAT-ARIN

# end


# start

NetRange:       74.48.64.0 - 74.48.127.255
CIDR:           74.48.64.0/18
NetName:        MULTA-NET
NetHandle:      NET-74-48-64-0-1
Parent:         TELUS-3 (NET-74-48-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   MULTACOM CORPORATION (MULTA)
RegDate:        2023-09-28
Updated:        2023-09-28
Ref:            https://rdap.arin.net/registry/ip/74.48.64.0


OrgName:        MULTACOM CORPORATION
OrgId:          MULTA
Address:        16654 Soledad Canyon Rd #150
City:           Canyon Country
StateProv:      CA
PostalCode:     91387
Country:        US
RegDate:        2005-03-23
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/MULTA

ReferralServer:  rwhois://rwhois.multacom.com:4321

OrgTechHandle: NOC1793-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-661-977-9436 
OrgTechEmail:  noc@multacom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC1793-ARIN

OrgAbuseHandle: ABUSE898-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-661-554-0287 
OrgAbuseEmail:  abuse@multacom.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE898-ARIN

RAbuseHandle: ABUSE898-ARIN
RAbuseName:   Abuse Department
RAbusePhone:  +1-661-554-0287 
RAbuseEmail:  abuse@multacom.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE898-ARIN

RNOCHandle: NOC1793-ARIN
RNOCName:   Network Operations Center
RNOCPhone:  +1-661-977-9436 
RNOCEmail:  noc@multacom.com
RNOCRef:    https://rdap.arin.net/registry/entity/NOC1793-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.multacom.com:4321.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.48.72.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;74.48.72.168.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025091801 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 19 04:29:18 CST 2025
;; MSG SIZE  rcvd: 105
Host info
168.72.48.74.in-addr.arpa domain name pointer 168-31-211-198-dedicated.multacom.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
168.72.48.74.in-addr.arpa	name = 168-31-211-198-dedicated.multacom.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.203.96.105 attackbotsspam
SSH invalid-user multiple login try
2019-12-14 00:12:13
79.143.32.156 attack
445/tcp
[2019-12-13]1pkt
2019-12-14 00:44:09
61.163.216.136 attack
firewall-block, port(s): 1433/tcp
2019-12-14 00:15:21
54.39.145.123 attack
Dec 13 16:26:09 web8 sshd\[32106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.123  user=root
Dec 13 16:26:10 web8 sshd\[32106\]: Failed password for root from 54.39.145.123 port 33348 ssh2
Dec 13 16:31:26 web8 sshd\[2455\]: Invalid user lissauer from 54.39.145.123
Dec 13 16:31:26 web8 sshd\[2455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.123
Dec 13 16:31:28 web8 sshd\[2455\]: Failed password for invalid user lissauer from 54.39.145.123 port 39826 ssh2
2019-12-14 00:44:35
193.112.32.238 attackbotsspam
Dec 13 16:59:44 * sshd[4656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.32.238
Dec 13 16:59:46 * sshd[4656]: Failed password for invalid user caruso from 193.112.32.238 port 33582 ssh2
2019-12-14 00:33:46
196.188.42.130 attackbotsspam
Dec 13 15:35:22 XXXXXX sshd[10226]: Invalid user esfahan from 196.188.42.130 port 48979
2019-12-14 00:16:15
93.39.104.224 attack
Dec 13 06:11:37 web1 sshd\[27581\]: Invalid user ausgrabungsstaette from 93.39.104.224
Dec 13 06:11:37 web1 sshd\[27581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.39.104.224
Dec 13 06:11:39 web1 sshd\[27581\]: Failed password for invalid user ausgrabungsstaette from 93.39.104.224 port 53546 ssh2
Dec 13 06:17:32 web1 sshd\[28177\]: Invalid user wwwadmin from 93.39.104.224
Dec 13 06:17:32 web1 sshd\[28177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.39.104.224
2019-12-14 00:31:32
81.183.166.219 attackspambots
Automatic report - Port Scan Attack
2019-12-14 00:37:47
188.165.194.169 attackspambots
Dec 13 10:22:31 linuxvps sshd\[46827\]: Invalid user gz from 188.165.194.169
Dec 13 10:22:31 linuxvps sshd\[46827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.194.169
Dec 13 10:22:33 linuxvps sshd\[46827\]: Failed password for invalid user gz from 188.165.194.169 port 56260 ssh2
Dec 13 10:27:59 linuxvps sshd\[49938\]: Invalid user bollack from 188.165.194.169
Dec 13 10:27:59 linuxvps sshd\[49938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.194.169
2019-12-14 00:03:42
189.90.241.134 attack
Dec 13 17:38:23 mail sshd\[20575\]: Invalid user andik from 189.90.241.134
Dec 13 17:38:23 mail sshd\[20575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.241.134
Dec 13 17:38:24 mail sshd\[20575\]: Failed password for invalid user andik from 189.90.241.134 port 57012 ssh2
...
2019-12-14 00:39:22
115.74.246.141 attackbots
Dec 13 15:47:35 XXXXXX sshd[11143]: Invalid user guest from 115.74.246.141 port 57771
2019-12-14 00:13:50
200.27.3.37 attack
Dec 13 15:51:27 hcbbdb sshd\[14933\]: Invalid user jacolmenares from 200.27.3.37
Dec 13 15:51:27 hcbbdb sshd\[14933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.27.3.37
Dec 13 15:51:28 hcbbdb sshd\[14933\]: Failed password for invalid user jacolmenares from 200.27.3.37 port 53014 ssh2
Dec 13 15:59:58 hcbbdb sshd\[15820\]: Invalid user jjjjjjjjjj from 200.27.3.37
Dec 13 15:59:58 hcbbdb sshd\[15820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.27.3.37
2019-12-14 00:21:10
91.204.250.59 attackbots
8080/tcp
[2019-12-13]1pkt
2019-12-14 00:31:54
101.230.236.177 attackbotsspam
Dec 13 16:59:37 MK-Soft-VM3 sshd[26823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.230.236.177 
Dec 13 16:59:40 MK-Soft-VM3 sshd[26823]: Failed password for invalid user dddddd from 101.230.236.177 port 39038 ssh2
...
2019-12-14 00:43:03
217.182.172.204 attackbots
Dec 13 17:26:35 sd-53420 sshd\[1758\]: Invalid user nologin from 217.182.172.204
Dec 13 17:26:35 sd-53420 sshd\[1758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.172.204
Dec 13 17:26:37 sd-53420 sshd\[1758\]: Failed password for invalid user nologin from 217.182.172.204 port 51316 ssh2
Dec 13 17:31:52 sd-53420 sshd\[2127\]: Invalid user vote from 217.182.172.204
Dec 13 17:31:52 sd-53420 sshd\[2127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.172.204
...
2019-12-14 00:38:55

Recently Reported IPs

192.168.5.218 185.247.137.13 215.93.191.39 45.134.13.211
118.89.233.234 87.236.176.5 185.247.137.76 2409:8929:6f28:84e0:ec1d:28ff:fe1f:415f
240e:440:1210:37f9:1842:6e1a:3c8a:fa2f 159.223.195.64 78.128.114.98 20.163.15.96
59.82.83.47 59.82.83.168 223.104.162.103 57.158.76.231
158.94.208.219 2603:10b6:101:21::3 192.168.2.200 161.35.11.45