Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Randers

Region: Region Midtjylland

Country: Denmark

Internet Service Provider: TDC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.164.224.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33537
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;93.164.224.72.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 16:48:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
72.224.164.93.in-addr.arpa domain name pointer 93-164-224-72-static.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.224.164.93.in-addr.arpa	name = 93-164-224-72-static.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.198.191.86 attackbotsspam
$f2bV_matches
2020-09-23 13:29:02
182.61.146.217 attack
Time:     Wed Sep 23 02:23:44 2020 +0000
IP:       182.61.146.217 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 23 02:19:52 3 sshd[3892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.146.217  user=root
Sep 23 02:19:54 3 sshd[3892]: Failed password for root from 182.61.146.217 port 44144 ssh2
Sep 23 02:21:47 3 sshd[8018]: Invalid user bruno from 182.61.146.217 port 50286
Sep 23 02:21:49 3 sshd[8018]: Failed password for invalid user bruno from 182.61.146.217 port 50286 ssh2
Sep 23 02:23:41 3 sshd[11796]: Invalid user service from 182.61.146.217 port 56434
2020-09-23 13:27:42
222.186.15.62 attackspambots
prod8
...
2020-09-23 13:12:45
51.75.206.42 attackbotsspam
Invalid user spravce from 51.75.206.42 port 43458
2020-09-23 12:59:42
217.111.239.37 attackspam
$f2bV_matches
2020-09-23 13:01:22
196.52.43.98 attackspambots
Port scanning [2 denied]
2020-09-23 13:37:15
175.19.204.2 attackspam
Found on   Binary Defense     / proto=6  .  srcport=40167  .  dstport=1433  .     (3087)
2020-09-23 13:34:05
106.52.137.134 attack
Time:     Wed Sep 23 02:33:26 2020 +0000
IP:       106.52.137.134 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 23 02:24:28 3 sshd[13388]: Failed password for root from 106.52.137.134 port 49878 ssh2
Sep 23 02:31:06 3 sshd[27032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.137.134  user=root
Sep 23 02:31:08 3 sshd[27032]: Failed password for root from 106.52.137.134 port 44474 ssh2
Sep 23 02:33:19 3 sshd[31710]: Invalid user spotlight from 106.52.137.134 port 52104
Sep 23 02:33:21 3 sshd[31710]: Failed password for invalid user spotlight from 106.52.137.134 port 52104 ssh2
2020-09-23 13:04:24
103.146.63.44 attackspambots
Invalid user pop from 103.146.63.44 port 40468
2020-09-23 13:24:26
82.200.65.218 attackspam
Fail2Ban Ban Triggered (2)
2020-09-23 13:34:52
62.103.87.101 attackspambots
Sep 23 04:01:43 scw-focused-cartwright sshd[4377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.103.87.101
Sep 23 04:01:45 scw-focused-cartwright sshd[4377]: Failed password for invalid user keith from 62.103.87.101 port 50361 ssh2
2020-09-23 13:25:19
222.186.175.216 attackbotsspam
Failed password for root from 222.186.175.216 port 5632 ssh2
Failed password for root from 222.186.175.216 port 5632 ssh2
Failed password for root from 222.186.175.216 port 5632 ssh2
Failed password for root from 222.186.175.216 port 5632 ssh2
2020-09-23 13:07:37
119.29.234.23 attackspam
Invalid user r from 119.29.234.23 port 40628
2020-09-23 13:21:12
36.189.253.226 attackspam
SSH Brute Force
2020-09-23 12:57:27
106.12.205.137 attack
$f2bV_matches
2020-09-23 13:23:31

Recently Reported IPs

83.41.180.31 18.233.174.208 117.52.107.2 161.233.158.211
179.162.243.37 100.231.22.92 156.228.128.101 60.77.46.237
48.17.89.114 27.214.2.230 83.170.63.206 224.17.173.90
246.221.59.60 150.119.221.184 123.229.247.146 151.145.210.12
70.17.9.47 51.79.192.157 125.21.33.114 176.50.192.15