Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.53.129.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45210
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.53.129.72.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 14:31:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 72.129.53.166.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 166.53.129.72.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
186.123.55.201 attackspambots
Attempts against non-existent wp-login
2020-07-26 19:18:04
87.226.2.194 attackbotsspam
Unauthorized connection attempt detected from IP address 87.226.2.194 to port 5555
2020-07-26 19:42:59
49.235.178.160 attackbots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-07-26 19:41:14
106.13.1.245 attackspambots
Invalid user sss from 106.13.1.245 port 40948
2020-07-26 19:26:47
117.6.97.138 attackspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-26T11:14:52Z and 2020-07-26T11:23:39Z
2020-07-26 19:31:36
188.163.109.153 attackspam
0,30-01/02 [bc01/m32] PostRequest-Spammer scoring: brussels
2020-07-26 19:11:01
14.21.36.84 attackspam
Jul 26 10:40:50 localhost sshd\[11958\]: Invalid user gmodserver from 14.21.36.84 port 51120
Jul 26 10:40:50 localhost sshd\[11958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.21.36.84
Jul 26 10:40:52 localhost sshd\[11958\]: Failed password for invalid user gmodserver from 14.21.36.84 port 51120 ssh2
...
2020-07-26 19:13:15
122.51.41.109 attackbotsspam
Jul 26 11:45:33 ns382633 sshd\[6592\]: Invalid user weed from 122.51.41.109 port 36684
Jul 26 11:45:33 ns382633 sshd\[6592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.41.109
Jul 26 11:45:35 ns382633 sshd\[6592\]: Failed password for invalid user weed from 122.51.41.109 port 36684 ssh2
Jul 26 11:50:02 ns382633 sshd\[6901\]: Invalid user gpadmin from 122.51.41.109 port 48230
Jul 26 11:50:02 ns382633 sshd\[6901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.41.109
2020-07-26 19:40:05
184.105.247.194 attack
Unauthorized connection attempt detected from IP address 184.105.247.194 to port 548
2020-07-26 19:21:46
219.134.216.227 attackspam
Jul 26 05:44:29 marvibiene sshd[25146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.134.216.227 
Jul 26 05:44:31 marvibiene sshd[25146]: Failed password for invalid user nn from 219.134.216.227 port 52302 ssh2
Jul 26 05:50:55 marvibiene sshd[25470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.134.216.227
2020-07-26 19:34:42
210.16.187.206 attackspam
Invalid user jh from 210.16.187.206 port 51670
2020-07-26 19:30:13
80.82.78.82 attack
 TCP (SYN) 80.82.78.82:58579 -> port 4095, len 44
2020-07-26 19:37:56
77.247.178.182 attackbots
0,28-01/31 [bc01/m30] PostRequest-Spammer scoring: brussels
2020-07-26 19:40:35
103.145.12.193 attackbots
[2020-07-26 01:54:25] NOTICE[1248] chan_sip.c: Registration from '"100" ' failed for '103.145.12.193:49096' - Wrong password
[2020-07-26 01:54:25] SECURITY[1275] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-26T01:54:25.933-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="100",SessionID="0x7f2720034288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.193/5060",Challenge="3c8dfe20",ReceivedChallenge="3c8dfe20",ReceivedHash="fe32f61dba328020e8bab8fad89825ad"
[2020-07-26 01:54:26] NOTICE[1248] chan_sip.c: Registration from '"100" ' failed for '103.145.12.193:49096' - Wrong password
[2020-07-26 01:54:26] SECURITY[1275] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-26T01:54:26.129-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="100",SessionID="0x7f27200a3458",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103
...
2020-07-26 19:10:45
118.24.22.175 attackbotsspam
PHP Info File Request - Possible PHP Version Scan
2020-07-26 19:33:49

Recently Reported IPs

150.193.234.3 219.162.17.61 191.87.57.109 76.92.105.100
6.115.18.12 82.62.60.29 90.180.2.96 208.231.53.240
206.141.252.233 210.105.43.199 252.215.115.144 150.210.247.60
253.220.133.195 77.51.184.101 53.217.210.41 175.222.138.116
59.163.83.231 29.94.197.108 6.9.102.7 137.12.210.217