Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oshkosh

Region: Wisconsin

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.1.14.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38527
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;72.1.14.243.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081900 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 19 14:03:06 CST 2019
;; MSG SIZE  rcvd: 115
Host info
243.14.1.72.in-addr.arpa domain name pointer static-72-1-14-243.ntd.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
243.14.1.72.in-addr.arpa	name = static-72-1-14-243.ntd.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.211.248.114 attack
5 pkts, ports: TCP:3629, TCP:8888, TCP:1080, TCP:9999, TCP:4145
2019-09-08 02:19:19
134.209.216.249 attackspambots
134.209.216.249 - - [07/Sep/2019:12:42:49 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.209.216.249 - - [07/Sep/2019:12:42:53 +0200] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.209.216.249 - - [07/Sep/2019:12:43:25 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.209.216.249 - - [07/Sep/2019:12:43:33 +0200] "POST /wp-login.php HTTP/1.1" 200 1688 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.209.216.249 - - [07/Sep/2019:12:43:36 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.209.216.249 - - [07/Sep/2019:12:43:40 +0200] "POST /wp-login.php HTTP/1.1" 200 1684 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
.
2019-09-08 02:28:43
185.234.219.190 attackspam
Sep  7 18:41:32 Server12 postfix/smtpd[7838]: warning: unknown[185.234.219.190]: SASL LOGIN authentication failed: authentication failure
2019-09-08 02:54:13
121.42.154.116 attackbotsspam
Brute forcing Wordpress login
2019-09-08 02:05:49
144.135.85.184 attack
2019-09-07T13:36:41.142886abusebot-7.cloudsearch.cf sshd\[19855\]: Invalid user test from 144.135.85.184 port 19983
2019-09-08 02:16:46
51.68.227.49 attack
Sep  7 20:18:31 SilenceServices sshd[28274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.227.49
Sep  7 20:18:32 SilenceServices sshd[28274]: Failed password for invalid user user from 51.68.227.49 port 49760 ssh2
Sep  7 20:22:27 SilenceServices sshd[29739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.227.49
2019-09-08 02:36:38
119.235.48.42 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-07 10:06:56,917 INFO [amun_request_handler] PortScan Detected on Port: 445 (119.235.48.42)
2019-09-08 02:42:55
58.87.92.153 attack
Sep  7 19:59:08 h2177944 sshd\[13752\]: Invalid user student2 from 58.87.92.153 port 41222
Sep  7 19:59:08 h2177944 sshd\[13752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.92.153
Sep  7 19:59:11 h2177944 sshd\[13752\]: Failed password for invalid user student2 from 58.87.92.153 port 41222 ssh2
Sep  7 20:01:41 h2177944 sshd\[14284\]: Invalid user teste1 from 58.87.92.153 port 34582
...
2019-09-08 02:19:48
103.74.121.142 attackbotsspam
Automatic report - Banned IP Access
2019-09-08 02:49:33
35.176.33.20 attack
Sep  7 17:42:22 vps01 sshd[17430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.176.33.20
Sep  7 17:42:24 vps01 sshd[17430]: Failed password for invalid user mailserver from 35.176.33.20 port 46500 ssh2
2019-09-08 02:39:23
193.223.104.107 attackbots
Received: from shaxiaclick.top (193.223.104.107) 
Domain Service
2019-09-08 02:53:54
51.38.236.255 attackbots
Sep  7 08:36:13 hcbb sshd\[18804\]: Invalid user 123456 from 51.38.236.255
Sep  7 08:36:13 hcbb sshd\[18804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=255.ip-51-38-236.eu
Sep  7 08:36:15 hcbb sshd\[18804\]: Failed password for invalid user 123456 from 51.38.236.255 port 42262 ssh2
Sep  7 08:40:15 hcbb sshd\[19213\]: Invalid user 123321 from 51.38.236.255
Sep  7 08:40:15 hcbb sshd\[19213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=255.ip-51-38-236.eu
2019-09-08 02:51:20
104.248.57.21 attack
Sep  7 20:08:43 OPSO sshd\[16179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.57.21  user=root
Sep  7 20:08:45 OPSO sshd\[16179\]: Failed password for root from 104.248.57.21 port 50240 ssh2
Sep  7 20:13:05 OPSO sshd\[17192\]: Invalid user sysadmin from 104.248.57.21 port 37086
Sep  7 20:13:05 OPSO sshd\[17192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.57.21
Sep  7 20:13:07 OPSO sshd\[17192\]: Failed password for invalid user sysadmin from 104.248.57.21 port 37086 ssh2
2019-09-08 02:23:04
42.113.155.35 attackbots
Unauthorized connection attempt from IP address 42.113.155.35 on Port 445(SMB)
2019-09-08 02:30:17
141.98.9.205 attackbotsspam
Sep  7 20:19:41 relay postfix/smtpd\[28006\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 20:20:26 relay postfix/smtpd\[21109\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 20:20:35 relay postfix/smtpd\[28050\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 20:21:19 relay postfix/smtpd\[21109\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 20:21:26 relay postfix/smtpd\[28050\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-08 02:25:35

Recently Reported IPs

128.199.132.137 112.215.219.146 211.21.23.142 189.112.150.38
167.71.203.156 201.234.24.175 159.122.188.176 190.38.234.37
162.220.166.114 116.233.212.110 180.244.67.207 203.104.0.108
40.122.117.21 94.23.5.135 81.12.167.149 212.64.15.236
201.42.173.18 88.5.86.17 81.90.58.128 121.19.123.218