Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.140.72.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;165.140.72.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025041003 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 11 14:31:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 12.72.140.165.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.72.140.165.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.233.12.156 attackbotsspam
Port probing on unauthorized port 6379
2020-09-21 15:57:53
121.46.26.126 attackspambots
20 attempts against mh-ssh on pcx
2020-09-21 16:05:29
113.23.104.80 attackspambots
Unauthorized connection attempt from IP address 113.23.104.80 on Port 445(SMB)
2020-09-21 16:01:17
222.186.42.155 attack
Sep 21 10:04:47 markkoudstaal sshd[12248]: Failed password for root from 222.186.42.155 port 58068 ssh2
Sep 21 10:04:49 markkoudstaal sshd[12248]: Failed password for root from 222.186.42.155 port 58068 ssh2
Sep 21 10:04:51 markkoudstaal sshd[12248]: Failed password for root from 222.186.42.155 port 58068 ssh2
...
2020-09-21 16:05:14
68.183.23.6 attack
Invalid user ubnt from 68.183.23.6 port 51594
2020-09-21 16:25:19
218.103.129.15 attack
2020-09-20T17:00:28.641320Z 7d5a9c8bb2e3 New connection: 218.103.129.15:56638 (172.17.0.5:2222) [session: 7d5a9c8bb2e3]
2020-09-20T17:00:31.673747Z 64d02c68e6ff New connection: 218.103.129.15:56659 (172.17.0.5:2222) [session: 64d02c68e6ff]
2020-09-21 16:15:12
109.167.231.99 attackbotsspam
DATE:2020-09-21 08:37:21, IP:109.167.231.99, PORT:ssh SSH brute force auth (docker-dc)
2020-09-21 16:23:55
5.228.183.194 attackspambots
Unauthorized connection attempt from IP address 5.228.183.194 on Port 445(SMB)
2020-09-21 16:00:15
83.96.16.43 attack
Auto Detect Rule!
proto TCP (SYN), 83.96.16.43:53622->gjan.info:23, len 40
2020-09-21 16:09:47
192.241.237.61 attackbotsspam
Found on   CINS badguys     / proto=6  .  srcport=43791  .  dstport=443  .     (2315)
2020-09-21 16:07:19
122.117.211.102 attack
Port Scan detected!
...
2020-09-21 16:22:29
106.13.184.128 attack
2020-09-21T06:24:59.038215Z 719577d85a84 New connection: 106.13.184.128:41840 (172.17.0.5:2222) [session: 719577d85a84]
2020-09-21T06:36:45.319851Z 4110c72678c6 New connection: 106.13.184.128:33192 (172.17.0.5:2222) [session: 4110c72678c6]
2020-09-21 16:24:08
218.249.73.161 attackspam
Automatic report - Banned IP Access
2020-09-21 16:14:40
186.234.80.162 attackbotsspam
186.234.80.162 - - [20/Sep/2020:18:00:14 +0100] "POST /wp-login.php HTTP/1.1" 200 2252 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
186.234.80.162 - - [20/Sep/2020:18:00:16 +0100] "POST /wp-login.php HTTP/1.1" 200 2231 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
186.234.80.162 - - [20/Sep/2020:18:00:16 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-21 16:33:41
210.86.172.86 attackbotsspam
2020-09-20T21:25:10.418631server.mjenks.net sshd[2281497]: Failed password for root from 210.86.172.86 port 40716 ssh2
2020-09-20T21:29:38.715115server.mjenks.net sshd[2282107]: Invalid user admin from 210.86.172.86 port 52226
2020-09-20T21:29:38.721769server.mjenks.net sshd[2282107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.86.172.86
2020-09-20T21:29:38.715115server.mjenks.net sshd[2282107]: Invalid user admin from 210.86.172.86 port 52226
2020-09-20T21:29:40.367012server.mjenks.net sshd[2282107]: Failed password for invalid user admin from 210.86.172.86 port 52226 ssh2
...
2020-09-21 16:18:48

Recently Reported IPs

52.184.94.230 183.221.157.212 183.83.246.193 183.83.246.230
27.254.216.54 63.228.92.72 195.94.10.52 82.114.162.71
107.154.192.227 104.234.115.34 43.156.228.27 20.221.69.50
195.94.13.225 185.36.81.82 45.156.128.43 34.76.133.13
113.30.168.121 166.108.229.191 235.197.234.59 115.205.194.110