Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.74.137.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.74.137.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 10:15:22 CST 2025
;; MSG SIZE  rcvd: 106
Host info
140.137.74.92.in-addr.arpa domain name pointer dslb-092-074-137-140.092.074.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.137.74.92.in-addr.arpa	name = dslb-092-074-137-140.092.074.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.144.197.199 attack
Unauthorized connection attempt from IP address 49.144.197.199 on Port 445(SMB)
2020-05-08 20:33:44
142.93.140.242 attackbotsspam
May  8 14:12:08 electroncash sshd[33246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 
May  8 14:12:08 electroncash sshd[33246]: Invalid user asd from 142.93.140.242 port 54534
May  8 14:12:10 electroncash sshd[33246]: Failed password for invalid user asd from 142.93.140.242 port 54534 ssh2
May  8 14:15:53 electroncash sshd[34290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242  user=root
May  8 14:15:55 electroncash sshd[34290]: Failed password for root from 142.93.140.242 port 35814 ssh2
...
2020-05-08 20:26:23
220.78.28.68 attack
May  8 14:07:06 inter-technics sshd[12539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.78.28.68  user=root
May  8 14:07:08 inter-technics sshd[12539]: Failed password for root from 220.78.28.68 port 35284 ssh2
May  8 14:11:26 inter-technics sshd[12965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.78.28.68  user=root
May  8 14:11:27 inter-technics sshd[12965]: Failed password for root from 220.78.28.68 port 3414 ssh2
May  8 14:15:51 inter-technics sshd[13350]: Invalid user dge from 220.78.28.68 port 54277
...
2020-05-08 20:29:04
45.14.150.86 attackspam
$f2bV_matches
2020-05-08 20:13:43
185.220.100.253 attackspam
May  8 13:42:35 vmd48417 sshd[30020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.100.253
2020-05-08 20:16:27
125.160.134.206 attackbots
Unauthorized connection attempt from IP address 125.160.134.206 on Port 445(SMB)
2020-05-08 20:25:42
186.10.102.182 attack
Unauthorized connection attempt from IP address 186.10.102.182 on Port 445(SMB)
2020-05-08 20:21:06
178.62.198.142 attackspam
May  8 16:54:25 gw1 sshd[16824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.198.142
May  8 16:54:27 gw1 sshd[16824]: Failed password for invalid user hernan from 178.62.198.142 port 50896 ssh2
...
2020-05-08 20:11:58
190.143.202.194 attackspambots
Unauthorized connection attempt from IP address 190.143.202.194 on Port 445(SMB)
2020-05-08 20:35:25
187.150.40.126 attackspam
Unauthorized connection attempt detected from IP address 187.150.40.126 to port 23
2020-05-08 20:05:00
93.174.228.82 attackbotsspam
Unauthorized connection attempt from IP address 93.174.228.82 on Port 445(SMB)
2020-05-08 20:20:27
89.221.92.66 attackspambots
Unauthorized connection attempt from IP address 89.221.92.66 on Port 445(SMB)
2020-05-08 20:30:04
112.85.42.186 attackspambots
2020-05-08T03:46:42.802956dmca.cloudsearch.cf sshd[23156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186  user=root
2020-05-08T03:46:45.310802dmca.cloudsearch.cf sshd[23156]: Failed password for root from 112.85.42.186 port 12550 ssh2
2020-05-08T03:46:47.837892dmca.cloudsearch.cf sshd[23156]: Failed password for root from 112.85.42.186 port 12550 ssh2
2020-05-08T03:46:42.802956dmca.cloudsearch.cf sshd[23156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186  user=root
2020-05-08T03:46:45.310802dmca.cloudsearch.cf sshd[23156]: Failed password for root from 112.85.42.186 port 12550 ssh2
2020-05-08T03:46:47.837892dmca.cloudsearch.cf sshd[23156]: Failed password for root from 112.85.42.186 port 12550 ssh2
2020-05-08T03:46:42.802956dmca.cloudsearch.cf sshd[23156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186  user=root
2020-05-
...
2020-05-08 20:09:41
106.54.3.80 attackspam
2020-05-08T06:57:40.187108sd-86998 sshd[17112]: Invalid user mma from 106.54.3.80 port 36504
2020-05-08T06:57:40.192338sd-86998 sshd[17112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.3.80
2020-05-08T06:57:40.187108sd-86998 sshd[17112]: Invalid user mma from 106.54.3.80 port 36504
2020-05-08T06:57:41.912143sd-86998 sshd[17112]: Failed password for invalid user mma from 106.54.3.80 port 36504 ssh2
2020-05-08T07:02:37.590298sd-86998 sshd[17756]: Invalid user soft from 106.54.3.80 port 35876
...
2020-05-08 20:05:54
177.43.79.4 attackbots
May  8 14:15:54 mail sshd\[10905\]: Invalid user nwu from 177.43.79.4
May  8 14:15:54 mail sshd\[10905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.43.79.4
May  8 14:15:56 mail sshd\[10905\]: Failed password for invalid user nwu from 177.43.79.4 port 46062 ssh2
...
2020-05-08 20:20:02

Recently Reported IPs

138.15.117.189 167.231.54.4 189.55.91.144 135.190.123.229
67.224.192.123 130.119.240.251 27.45.159.146 32.95.151.14
7.85.240.63 139.213.240.148 35.12.236.8 107.128.231.219
155.146.196.117 210.129.183.138 41.125.202.190 30.9.196.34
81.118.198.156 68.65.13.24 39.130.77.243 200.120.165.72