Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rowland Heights

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
172.95.161.66 attackspambots
Unauthorized connection attempt detected from IP address 172.95.161.66 to port 23 [J]
2020-02-05 17:46:56
172.95.161.66 attackbots
Unauthorized connection attempt detected from IP address 172.95.161.66 to port 23 [J]
2020-02-04 02:57:47
172.95.161.71 attackspam
37215/tcp 2323/tcp
[2019-10-18/12-15]2pkt
2019-12-16 07:47:24
172.95.161.71 attack
23/tcp 8080/tcp 8080/tcp
[2019-05-17/07-10]3pkt
2019-07-10 23:12:00
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       172.95.0.0 - 172.95.255.255
CIDR:           172.95.0.0/16
NetName:        FRTR-CAL
NetHandle:      NET-172-95-0-0-1
Parent:         NET172 (NET-172-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Frontier Communications Corporation (FCC-212)
RegDate:        2015-06-29
Updated:        2015-06-29
Comment:        abuse will only be handled through the abuse contact info
Ref:            https://rdap.arin.net/registry/ip/172.95.0.0



OrgName:        Frontier Communications Corporation
OrgId:          FCC-212
Address:        1400 E PHILLIPS BLVD
City:           POMONA
StateProv:      CA
PostalCode:     91766
Country:        US
RegDate:        2015-04-02
Updated:        2023-06-01
Comment:        Abuse complaints will only be responded to by the use of the abuse contact
Ref:            https://rdap.arin.net/registry/entity/FCC-212

ReferralServer:  rwhois://rwhois.frontiernet.net:4321

OrgTechHandle: ZF47-ARIN
OrgTechName:   Frontier Communications
OrgTechPhone:  +1-877-474-7876 
OrgTechEmail:  abuse@support.ftr.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZF47-ARIN

OrgAbuseHandle: ABUSE223-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-585-623-4519 
OrgAbuseEmail:  abuse@support.ftr.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE223-ARIN

OrgRoutingHandle: HOSTM2146-ARIN
OrgRoutingName:   Hostmaster
OrgRoutingPhone:  +1-585-777-0949 
OrgRoutingEmail:  hostmaster@support.ftr.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/HOSTM2146-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.frontiernet.net:4321.

%rwhois V-1.5:002090:00 whois.frontiernet.net (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:172.95.0.0/16
network:ID:NET-172-95-16-0-23
network:Network-Name:172-95-16-0-23
network:IP-Network:172.95.16.0/23
network:Org-Name;I:FTR3 BDSL Santa Monica CA
network:Street-Address:2001 Broadway
network:City:Santa Monica
network:State:CA
network:Postal-Code:90404
network:Country-Code:US
network:Tech-Contact;I:AR192-FRTR
network:Updated:20160331
network:Updated-By:ipadmin@support.ftr.com
network:Class-Name:network

network:Auth-Area:172.95.0.0/16
network:ID:NET-172-95-0-0-16
network:Network-Name:172-95-0-0-16
network:IP-Network:172.95.0.0/16
network:Org-Name;I:Frontier Communications Solutions
network:Street-Address:120 North Plymouth Ave
network:City:Rochester
network:State:NY
network:Postal-Code:14608
network:Country-Code:US
network:Tech-Contact;I:ABUSE-FRTR
network:Admin-Contact;I:IPADMIN-FRTR
network:Updated:20160407
network:Updated-By:ipadmin@support.ftr.com
network:Class-Name:network

%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.95.16.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53189
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;172.95.16.103.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110602 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 07 09:48:43 CST 2025
;; MSG SIZE  rcvd: 106
Host info
103.16.95.172.in-addr.arpa domain name pointer 172-95-16-103.static.snmn.ca.ip.frontiernet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
103.16.95.172.in-addr.arpa	name = 172-95-16-103.static.snmn.ca.ip.frontiernet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
191.217.190.254 attackspam
$f2bV_matches
2019-07-30 19:16:04
185.220.101.44 attackspam
Invalid user NetLinx from 185.220.101.44 port 39926
2019-07-30 19:26:00
59.13.139.50 attackspam
Jul 30 11:21:44 mout sshd[19712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.13.139.50
Jul 30 11:21:44 mout sshd[19712]: Invalid user gary from 59.13.139.50 port 35036
Jul 30 11:21:47 mout sshd[19712]: Failed password for invalid user gary from 59.13.139.50 port 35036 ssh2
2019-07-30 18:50:09
167.99.38.73 attackspambots
Port=
2019-07-30 18:44:58
185.253.250.168 attack
123/udp 123/udp 123/udp...
[2019-06-23/07-29]10pkt,1pt.(udp)
2019-07-30 19:01:16
168.126.101.166 attack
Fail2Ban Ban Triggered
2019-07-30 19:27:18
121.127.250.80 attackspam
445/tcp 445/tcp 445/tcp...
[2019-06-04/07-29]15pkt,1pt.(tcp)
2019-07-30 19:24:03
95.85.85.5 attack
445/tcp 445/tcp 445/tcp...
[2019-06-02/07-29]8pkt,1pt.(tcp)
2019-07-30 18:43:40
125.23.220.200 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-06-01/07-29]7pkt,1pt.(tcp)
2019-07-30 19:10:27
120.138.95.234 attackspam
445/tcp 445/tcp 445/tcp
[2019-06-19/07-29]3pkt
2019-07-30 18:51:52
177.69.26.97 attack
Jul 30 08:57:00 areeb-Workstation sshd\[1760\]: Invalid user admin from 177.69.26.97
Jul 30 08:57:00 areeb-Workstation sshd\[1760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.26.97
Jul 30 08:57:01 areeb-Workstation sshd\[1760\]: Failed password for invalid user admin from 177.69.26.97 port 41916 ssh2
...
2019-07-30 18:59:56
92.46.25.134 attackspam
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-30 04:17:18]
2019-07-30 18:53:20
190.128.230.14 attackbots
2019-07-30T10:51:16.495701abusebot-5.cloudsearch.cf sshd\[3788\]: Invalid user hy from 190.128.230.14 port 40363
2019-07-30 19:16:59
5.187.148.10 attackspambots
Jul 30 11:20:10 ns41 sshd[13165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.187.148.10
2019-07-30 18:47:41
114.40.163.156 attack
Jul 29 14:47:05 localhost kernel: [15670218.565419] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=114.40.163.156 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=43479 PROTO=TCP SPT=25227 DPT=37215 WINDOW=43653 RES=0x00 SYN URGP=0 
Jul 29 14:47:05 localhost kernel: [15670218.565443] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=114.40.163.156 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=43479 PROTO=TCP SPT=25227 DPT=37215 SEQ=758669438 ACK=0 WINDOW=43653 RES=0x00 SYN URGP=0 
Jul 29 22:18:07 localhost kernel: [15697280.836784] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=114.40.163.156 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=40979 PROTO=TCP SPT=39489 DPT=37215 WINDOW=33370 RES=0x00 SYN URGP=0 
Jul 29 22:18:07 localhost kernel: [15697280.836793] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=114.40.163.156 DST=[mungedIP2] LEN=40 TOS
2019-07-30 18:56:16

Recently Reported IPs

180.153.236.228 204.117.214.10 45.128.199.173 45.128.199.163
38.55.205.96 124.29.214.132 43.129.52.248 61.189.37.59
47.89.232.167 53.15.114.24 8.222.205.56 32.90.9.227
53.15.114.92 8.219.235.48 53.15.144.5 53.15.144.92
47.236.130.134 17.248.216.65 47.84.42.120 53.15.144.25