Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.130.64.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41914
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;72.130.64.14.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091102 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Sep 12 09:15:31 CST 2019
;; MSG SIZE  rcvd: 116
Host info
14.64.130.72.in-addr.arpa domain name pointer cpe-72-130-64-14.hawaii.res.rr.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
14.64.130.72.in-addr.arpa	name = cpe-72-130-64-14.hawaii.res.rr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.227.255.81 attackspambots
SSH invalid-user multiple login try
2019-06-28 16:49:20
91.226.152.116 attackbotsspam
445/tcp 445/tcp
[2019-06-19/28]2pkt
2019-06-28 16:43:16
199.127.60.228 attackbotsspam
445/tcp 445/tcp
[2019-06-19/28]2pkt
2019-06-28 16:48:16
106.0.36.114 attackbots
Triggered by Fail2Ban at Vostok web server
2019-06-28 16:53:03
185.36.81.168 attackspam
Rude login attack (4 tries in 1d)
2019-06-28 16:24:33
46.101.216.245 spamattack
Don't need to see naked woman and very happily married
2019-06-28 17:02:40
201.172.221.46 attack
445/tcp 445/tcp 445/tcp...
[2019-06-21/28]4pkt,1pt.(tcp)
2019-06-28 16:37:29
208.102.86.164 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=4704)(06281018)
2019-06-28 17:00:26
220.76.163.31 attackspambots
37215/tcp 23/tcp...
[2019-05-20/06-27]13pkt,2pt.(tcp)
2019-06-28 16:34:57
222.252.42.126 attackspambots
445/tcp 445/tcp
[2019-06-26/27]2pkt
2019-06-28 16:23:06
41.218.192.247 attackspam
Jun 28 07:03:08 mxgate1 sshd[558]: Invalid user admin from 41.218.192.247 port 52732
Jun 28 07:03:08 mxgate1 sshd[558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.218.192.247
Jun 28 07:03:10 mxgate1 sshd[558]: Failed password for invalid user admin from 41.218.192.247 port 52732 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.218.192.247
2019-06-28 16:51:12
141.98.10.41 attackbotsspam
Rude login attack (5 tries in 1d)
2019-06-28 17:11:12
108.58.51.202 attackspambots
Unauthorised access (Jun 28) SRC=108.58.51.202 LEN=40 TOS=0x08 PREC=0x40 TTL=47 ID=57606 TCP DPT=23 WINDOW=4275 SYN
2019-06-28 16:19:03
140.121.199.228 attackbots
Jun 28 07:12:18 dev sshd\[9147\]: Invalid user estelle from 140.121.199.228 port 55662
Jun 28 07:12:18 dev sshd\[9147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.121.199.228
...
2019-06-28 16:44:30
36.232.129.85 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(06281018)
2019-06-28 16:25:08

Recently Reported IPs

159.147.139.146 112.89.23.106 103.23.139.217 125.115.211.36
2.95.181.156 104.194.170.16 69.155.5.230 179.108.245.242
4.211.244.242 213.195.116.49 201.27.134.211 198.204.231.10
46.118.155.145 45.95.33.107 177.23.73.250 114.244.240.227
1.123.66.213 34.42.29.42 36.80.139.131 188.95.58.120