Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '93.123.72.0 - 93.123.72.255'

% Abuse contact for '93.123.72.0 - 93.123.72.255' is 'abuse@koddos.com'

inetnum:        93.123.72.0 - 93.123.72.255
netname:        SC-AMARUTU-20080305
country:        NL
org:            ORG-ATL58-RIPE
admin-c:        RL11970-RIPE
tech-c:         RL11970-RIPE
status:         ALLOCATED PA
mnt-by:         sc-amarutu-1-mnt
mnt-by:         RIPE-NCC-HM-MNT
created:        2022-11-25T10:01:18Z
last-modified:  2022-11-25T10:01:18Z
source:         RIPE

organisation:   ORG-ATL58-RIPE
org-name:       Amarutu Technology Ltd
country:        SC
org-type:       LIR
address:        Level 23, One Island East, 18 Westlands Road.
address:        N/A
address:        Hong Kong
address:        HONG KONG
phone:          +2484225244
admin-c:        RL11970-RIPE
tech-c:         RL11970-RIPE
abuse-c:        AR39335-RIPE
mnt-ref:        sc-amarutu-1-mnt
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         sc-amarutu-1-mnt
created:        2017-02-20T15:55:54Z
last-modified:  2020-12-16T13:36:50Z
source:         RIPE # Filtered

person:         Ronald Linco
address:        Level 23, One Island East, 18 Westlands Road.
address:        N/A
address:        Hong Kong
address:        HONG KONG
phone:          +2484225244
nic-hdl:        RL11970-RIPE
mnt-by:         sc-amarutu-1-mnt
created:        2017-02-20T15:55:54Z
last-modified:  2017-02-20T15:55:54Z
source:         RIPE

% Information related to '93.123.72.0/24AS206264'

route:          93.123.72.0/24
origin:         AS206264
descr:          Amarutu Technology Ltd. Network
mnt-by:         sc-amarutu-1-mnt
created:        2022-11-25T10:22:53Z
last-modified:  2022-11-25T10:22:53Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.123.72.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43116
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;93.123.72.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040900 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 23:30:48 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 166.72.123.93.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 166.72.123.93.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.108.88.78 attackbots
Mar 17 16:39:22 firewall sshd[10123]: Failed password for invalid user Ronald from 113.108.88.78 port 32941 ssh2
Mar 17 16:42:05 firewall sshd[10285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.108.88.78  user=root
Mar 17 16:42:07 firewall sshd[10285]: Failed password for root from 113.108.88.78 port 51402 ssh2
...
2020-03-18 09:49:38
72.167.224.135 attackbots
Mar 18 01:51:39 ovpn sshd\[8154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.167.224.135  user=root
Mar 18 01:51:41 ovpn sshd\[8154\]: Failed password for root from 72.167.224.135 port 45154 ssh2
Mar 18 01:55:36 ovpn sshd\[9326\]: Invalid user tssuser from 72.167.224.135
Mar 18 01:55:36 ovpn sshd\[9326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.167.224.135
Mar 18 01:55:37 ovpn sshd\[9326\]: Failed password for invalid user tssuser from 72.167.224.135 port 34940 ssh2
2020-03-18 09:57:34
122.3.55.209 attackspam
Unauthorized connection attempt from IP address 122.3.55.209 on Port 445(SMB)
2020-03-18 10:08:36
40.71.39.217 attack
Mar 17 19:47:38 lnxmysql61 sshd[23478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.39.217
Mar 17 19:47:38 lnxmysql61 sshd[23478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.39.217
2020-03-18 10:14:11
82.58.132.210 attack
Port probing on unauthorized port 9090
2020-03-18 09:55:43
114.43.174.68 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 10:15:36
52.97.191.237 attackbots
Unauthorized IMAP connection attempt
2020-03-18 10:09:14
158.69.160.191 attackspambots
2020-03-17T20:20:27.996107linuxbox-skyline sshd[33471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.160.191  user=root
2020-03-17T20:20:30.091968linuxbox-skyline sshd[33471]: Failed password for root from 158.69.160.191 port 38500 ssh2
...
2020-03-18 10:31:31
5.123.162.44 attack
Unauthorized connection attempt from IP address 5.123.162.44 on Port 445(SMB)
2020-03-18 09:50:06
23.105.42.206 attackbotsspam
RDP Brute-Force
2020-03-18 10:09:50
142.93.159.29 attack
Invalid user niiv from 142.93.159.29 port 41606
2020-03-18 10:29:12
211.219.114.39 attackspambots
SSH bruteforce (Triggered fail2ban)
2020-03-18 09:58:29
122.154.251.22 attackbotsspam
Mar 18 00:53:39 vserver sshd\[29697\]: Failed password for root from 122.154.251.22 port 52314 ssh2Mar 18 00:55:59 vserver sshd\[29724\]: Failed password for root from 122.154.251.22 port 58758 ssh2Mar 18 00:58:12 vserver sshd\[29734\]: Invalid user ts3 from 122.154.251.22Mar 18 00:58:15 vserver sshd\[29734\]: Failed password for invalid user ts3 from 122.154.251.22 port 36980 ssh2
...
2020-03-18 10:25:28
107.170.204.148 attackbotsspam
Mar 18 01:32:54 ns41 sshd[25198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.204.148
2020-03-18 09:59:35
210.175.50.124 attackspam
Mar 17 21:26:19 ws22vmsma01 sshd[123188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.175.50.124
Mar 17 21:26:21 ws22vmsma01 sshd[123188]: Failed password for invalid user lichengzhang from 210.175.50.124 port 14450 ssh2
...
2020-03-18 10:06:18

Recently Reported IPs

2606:4700:10::6816:2207 2606:4700:10::6814:4461 31.92.92.78 234.0.22.102
142.93.3.173 2606:4700:10::6816:938 2606:4700:10::6814:4624 2606:4700:10::ac43:95e
2606:4700:10::6814:6122 164.155.74.38 111.55.113.213 113.8.33.50
39.182.81.160 146.70.160.238 206.163.4.2 172.213.2.23
2606:4700:10::6816:3388 2606:4700:10::6814:8636 2606:4700:10::6814:5823 185.63.235.224