Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.164.14.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46630
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.164.14.72.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 11:57:20 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 72.14.164.130.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 130.164.14.72.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
83.243.72.173 attack
Aug 30 04:19:07 dev0-dcfr-rnet sshd[22924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.243.72.173
Aug 30 04:19:10 dev0-dcfr-rnet sshd[22924]: Failed password for invalid user customer from 83.243.72.173 port 42999 ssh2
Aug 30 04:23:28 dev0-dcfr-rnet sshd[22941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.243.72.173
2019-08-30 11:23:06
42.117.113.159 attackbots
firewall-block, port(s): 23/tcp
2019-08-30 12:03:04
113.131.183.4 attack
firewall-block, port(s): 23/tcp
2019-08-30 11:50:05
111.231.82.143 attackspam
$f2bV_matches_ltvn
2019-08-30 11:45:04
138.219.220.235 attackbotsspam
Aug 29 22:16:21 xeon postfix/smtpd[37542]: warning: unknown[138.219.220.235]: SASL PLAIN authentication failed: authentication failure
2019-08-30 12:06:42
198.108.66.254 attackspam
firewall-block, port(s): 2082/tcp
2019-08-30 11:26:07
80.211.239.102 attackbotsspam
Aug 29 15:16:45 lcprod sshd\[26534\]: Invalid user nagios from 80.211.239.102
Aug 29 15:16:45 lcprod sshd\[26534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.239.102
Aug 29 15:16:47 lcprod sshd\[26534\]: Failed password for invalid user nagios from 80.211.239.102 port 45966 ssh2
Aug 29 15:20:53 lcprod sshd\[26927\]: Invalid user honey from 80.211.239.102
Aug 29 15:20:53 lcprod sshd\[26927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.239.102
2019-08-30 11:30:55
221.122.67.66 attack
Aug 30 05:54:25 lnxweb62 sshd[13510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.67.66
2019-08-30 11:59:07
106.12.202.180 attack
Invalid user ftp from 106.12.202.180 port 52915
2019-08-30 12:00:23
104.236.175.127 attack
SSH Brute Force, server-1 sshd[12993]: Failed password for invalid user flink from 104.236.175.127 port 42458 ssh2
2019-08-30 11:49:05
198.210.105.45 attackspam
firewall-block, port(s): 5431/tcp
2019-08-30 11:24:38
163.172.228.24 attackspam
Thu 29 16:48:26 5100/udp
2019-08-30 11:33:03
54.37.139.235 attack
Aug 29 17:16:30 kapalua sshd\[31365\]: Invalid user louis from 54.37.139.235
Aug 29 17:16:30 kapalua sshd\[31365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=235.ip-54-37-139.eu
Aug 29 17:16:32 kapalua sshd\[31365\]: Failed password for invalid user louis from 54.37.139.235 port 56858 ssh2
Aug 29 17:20:25 kapalua sshd\[31677\]: Invalid user lucina from 54.37.139.235
Aug 29 17:20:25 kapalua sshd\[31677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=235.ip-54-37-139.eu
2019-08-30 11:23:36
185.211.245.170 attackbotsspam
Aug 30 04:38:10 mail postfix/smtpd\[20454\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug 30 05:12:31 mail postfix/smtpd\[25160\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug 30 05:42:36 mail postfix/smtpd\[25272\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug 30 05:42:53 mail postfix/smtpd\[27295\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-08-30 12:02:29
115.61.36.106 attack
Port Scan: TCP/8080
2019-08-30 11:27:46

Recently Reported IPs

66.250.129.236 168.220.175.254 247.254.79.49 3.8.3.72
116.12.245.86 139.82.58.171 86.192.50.254 168.46.18.16
118.194.32.9 119.61.10.157 193.234.162.89 23.21.221.142
130.191.125.158 91.59.126.123 114.140.38.85 204.51.161.78
194.18.86.222 16.210.120.252 129.106.209.21 126.115.144.139