Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 73.242.213.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;73.242.213.180.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:19:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
180.213.242.73.in-addr.arpa domain name pointer c-73-242-213-180.hsd1.nm.comcast.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
180.213.242.73.in-addr.arpa	name = c-73-242-213-180.hsd1.nm.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.235.120.203 attack
Unauthorized SSH login attempts
2020-09-11 04:01:47
36.7.142.146 attackbotsspam
Attempted connection to port 1433.
2020-09-11 04:04:37
190.38.208.134 attack
Attempted connection to port 445.
2020-09-11 04:05:44
159.203.192.134 attackspam
Port Scan
...
2020-09-11 03:59:49
172.98.193.62 attackspam
172.98.193.62 - - \[10/Sep/2020:18:36:44 +0200\] "GET /index.php\?id=ausland%22%29%29%2F%2A\&id=%2A%2FAS%2F%2A\&id=%2A%2FjrTb%2F%2A\&id=%2A%2FWHERE%2F%2A\&id=%2A%2F6653%3D6653%2F%2A\&id=%2A%2FOR%2F%2A\&id=%2A%2FNOT%2F%2A\&id=%2A%2F5335%3D1536--%2F%2A\&id=%2A%2FpVPA HTTP/1.1" 200 15500 "http://www.firma-lsf.eu:80/index.php" "Googlebot \(compatible  Googlebot/2.1   http://www.google.com/bot.html\)"
...
2020-09-11 03:56:18
118.24.17.28 attackbots
SSH login attempts.
2020-09-11 04:13:24
210.77.68.221 attack
Sep 10 20:34:47 jane sshd[6458]: Failed password for root from 210.77.68.221 port 63994 ssh2
...
2020-09-11 03:43:00
188.43.245.225 attack
Unauthorized connection attempt from IP address 188.43.245.225 on Port 445(SMB)
2020-09-11 03:46:42
61.183.9.17 attackspambots
Icarus honeypot on github
2020-09-11 03:41:00
74.66.97.29 attack
Attempted connection to port 81.
2020-09-11 04:03:32
49.72.26.165 attack
Repeated brute force against a port
2020-09-11 03:48:24
129.28.169.185 attackspam
leo_www
2020-09-11 04:07:06
124.158.160.34 attackbots
Unauthorized connection attempt from IP address 124.158.160.34 on Port 445(SMB)
2020-09-11 04:01:25
106.12.16.149 attackbotsspam
Brute%20Force%20SSH
2020-09-11 03:43:32
103.102.57.178 attackbotsspam
Unauthorized connection attempt from IP address 103.102.57.178 on Port 445(SMB)
2020-09-11 03:53:47

Recently Reported IPs

98.179.97.46 122.54.131.72 131.20.232.129 165.251.109.251
212.136.245.153 211.212.85.82 26.91.44.171 106.195.204.103
36.176.120.23 162.28.204.43 101.116.9.107 107.42.125.97
68.98.100.17 211.129.31.106 17.132.183.29 135.238.254.70
26.60.173.76 138.21.167.231 198.10.244.248 125.129.123.39