Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.132.73.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53312
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.132.73.173.			IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072201 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 02:41:11 CST 2022
;; MSG SIZE  rcvd: 107
Host info
173.73.132.158.in-addr.arpa domain name pointer itsoas.polyu.edu.hk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
173.73.132.158.in-addr.arpa	name = itsoas.polyu.edu.hk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.112.37.242 attackspam
 TCP (SYN) 42.112.37.242:49422 -> port 6016, len 44
2020-10-01 06:57:17
92.118.160.21 attackspam
srv02 Mass scanning activity detected Target: 27017  ..
2020-10-01 06:46:13
195.54.161.107 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 40544 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 07:00:31
45.64.128.160 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-01 06:56:42
148.72.168.23 attackbotsspam
ET SCAN Sipvicious Scan - port: 5060 proto: sip cat: Attempted Information Leakbytes: 456
2020-10-01 06:38:16
202.98.203.20 attackspambots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-01 06:36:14
92.53.65.40 attack
Port Scan: TCP/589
2020-10-01 06:47:00
178.141.166.137 attackspambots
Fail2Ban Ban Triggered
2020-10-01 06:30:11
36.250.229.115 attackspam
SSH Invalid Login
2020-10-01 06:57:41
92.118.161.21 attackbotsspam
Port Scan/VNC login attempt
...
2020-10-01 06:45:49
51.195.63.170 attack
51.195.63.170 was recorded 13 times by 4 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 13, 79, 338
2020-10-01 06:28:11
66.240.205.34 attack
 TCP (SYN) 66.240.205.34:18081 -> port 1800, len 44
2020-10-01 06:51:58
51.79.173.79 attackspambots
SSH Invalid Login
2020-10-01 06:35:24
89.33.192.70 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 77 - port: 25 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 06:48:40
59.126.29.54 attackbotsspam
23/tcp 23/tcp 23/tcp...
[2020-08-02/09-30]4pkt,1pt.(tcp)
2020-10-01 06:53:03

Recently Reported IPs

158.133.111.23 158.132.29.185 158.132.180.48 158.133.31.248
158.132.251.51 158.133.125.50 158.132.197.118 158.133.168.46
158.133.247.60 158.133.235.121 158.133.36.222 158.133.46.218
158.133.107.201 158.133.185.109 158.132.234.188 158.133.34.207
158.133.19.209 158.133.159.172 158.133.219.215 158.132.252.60