Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vigo

Region: Galicia

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: R Cable y Telecomunicaciones Galicia, S.A.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.165.242.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43062
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;83.165.242.72.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060501 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 06 02:21:59 CST 2019
;; MSG SIZE  rcvd: 117

Host info
72.242.165.83.in-addr.arpa domain name pointer 72.242.165.83.dynamic.reverse-mundo-r.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
72.242.165.83.in-addr.arpa	name = 72.242.165.83.dynamic.reverse-mundo-r.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
88.250.254.90 attackspam
Automatic report - Port Scan Attack
2020-09-25 00:01:55
13.82.219.14 attackbots
Sep 24 15:16:53 cdc sshd[29254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.219.14  user=root
Sep 24 15:16:55 cdc sshd[29254]: Failed password for invalid user root from 13.82.219.14 port 41042 ssh2
2020-09-24 23:42:08
40.76.192.252 attackbots
Sep 24 16:42:24 cdc sshd[32695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.76.192.252  user=root
Sep 24 16:42:26 cdc sshd[32695]: Failed password for invalid user root from 40.76.192.252 port 23043 ssh2
2020-09-24 23:53:24
18.179.62.244 attackspambots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-09-25 00:05:11
49.33.157.210 attack
Unauthorized connection attempt from IP address 49.33.157.210 on Port 445(SMB)
2020-09-24 23:53:08
157.119.216.103 attack
Unauthorized connection attempt from IP address 157.119.216.103 on Port 445(SMB)
2020-09-24 23:31:43
178.62.6.215 attackbots
Invalid user development from 178.62.6.215 port 40914
2020-09-24 23:59:36
112.111.249.31 attackspam
ssh brute force
2020-09-24 23:40:33
118.123.173.18 attack
Unauthorized connection attempt from IP address 118.123.173.18 on Port 445(SMB)
2020-09-25 00:12:58
173.44.175.45 attackbotsspam
173.44.175.45 has been banned for [spam]
...
2020-09-24 23:39:22
197.245.95.2 attackbotsspam
Unauthorized connection attempt from IP address 197.245.95.2 on Port 445(SMB)
2020-09-25 00:11:41
103.62.232.234 attackspambots
Unauthorized connection attempt from IP address 103.62.232.234 on Port 445(SMB)
2020-09-24 23:45:17
122.51.32.91 attackspambots
Sep 24 06:35:14 onepixel sshd[2210778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.32.91 
Sep 24 06:35:14 onepixel sshd[2210778]: Invalid user limpa from 122.51.32.91 port 42230
Sep 24 06:35:16 onepixel sshd[2210778]: Failed password for invalid user limpa from 122.51.32.91 port 42230 ssh2
Sep 24 06:37:42 onepixel sshd[2211220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.32.91  user=root
Sep 24 06:37:44 onepixel sshd[2211220]: Failed password for root from 122.51.32.91 port 47614 ssh2
2020-09-24 23:35:42
218.29.83.38 attack
(sshd) Failed SSH login from 218.29.83.38 (CN/China/hn.kd.ny.adsl): 5 in the last 3600 secs
2020-09-25 00:07:52
14.248.84.104 attackbots
SMB
2020-09-24 23:29:20

Recently Reported IPs

91.97.41.182 171.232.76.192 195.46.239.182 64.39.175.164
153.187.210.120 93.89.203.5 212.231.231.141 181.176.176.2
195.143.28.34 185.4.242.154 212.95.204.22 217.195.38.55
23.208.178.150 5.165.239.51 152.43.197.91 167.141.15.94
109.190.34.82 172.125.213.72 34.206.130.40 76.4.155.86