Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Uganda

Internet Service Provider: Airtel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.80.189.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.80.189.63.			IN	A

;; AUTHORITY SECTION:
.			323	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 21 19:31:57 CST 2023
;; MSG SIZE  rcvd: 106
Host info
63.189.80.102.in-addr.arpa domain name pointer 63-189-80-102.r.airtel.ug.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
63.189.80.102.in-addr.arpa	name = 63-189-80-102.r.airtel.ug.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
216.158.219.26 attackspam
Chat Spam
2020-03-12 17:35:18
91.243.90.184 attackbotsspam
B: Magento admin pass test (wrong country)
2020-03-12 17:32:17
185.175.93.3 attack
03/12/2020-05:17:31.368223 185.175.93.3 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-12 17:20:24
45.55.177.230 attackbotsspam
Automatic report: SSH brute force attempt
2020-03-12 18:02:18
1.179.181.74 attack
trying to access non-authorized port
2020-03-12 17:20:45
5.196.198.147 attackbotsspam
Mar 12 10:56:45 server sshd\[19727\]: Invalid user www from 5.196.198.147
Mar 12 10:56:45 server sshd\[19727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.198.147 
Mar 12 10:56:47 server sshd\[19727\]: Failed password for invalid user www from 5.196.198.147 port 51802 ssh2
Mar 12 11:03:53 server sshd\[20898\]: Invalid user tester from 5.196.198.147
Mar 12 11:03:53 server sshd\[20898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.198.147 
...
2020-03-12 17:25:08
58.23.153.10 attack
Mar 12 03:12:39 mail sshd\[13810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.23.153.10  user=root
...
2020-03-12 17:50:44
191.7.152.13 attack
Mar 12 06:01:30 firewall sshd[8918]: Failed password for invalid user kristof from 191.7.152.13 port 40354 ssh2
Mar 12 06:05:29 firewall sshd[9008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.152.13  user=root
Mar 12 06:05:31 firewall sshd[9008]: Failed password for root from 191.7.152.13 port 39822 ssh2
...
2020-03-12 17:22:25
180.177.82.42 attackbotsspam
Hits on port : 5555
2020-03-12 17:47:23
178.171.123.141 attackspambots
Chat Spam
2020-03-12 17:57:23
162.243.184.249 attackspam
WordPress XMLRPC scan :: 162.243.184.249 0.064 BYPASS [12/Mar/2020:08:26:36  0000] [censored_2] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-12 17:43:07
103.219.29.28 attackspambots
Unauthorized connection attempt detected from IP address 103.219.29.28 to port 1433
2020-03-12 17:24:50
148.204.63.133 attack
Mar 12 08:14:14 vlre-nyc-1 sshd\[5323\]: Invalid user nmrih from 148.204.63.133
Mar 12 08:14:14 vlre-nyc-1 sshd\[5323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.204.63.133
Mar 12 08:14:16 vlre-nyc-1 sshd\[5323\]: Failed password for invalid user nmrih from 148.204.63.133 port 37762 ssh2
Mar 12 08:23:57 vlre-nyc-1 sshd\[5744\]: Invalid user qw1er2ty3 from 148.204.63.133
Mar 12 08:23:57 vlre-nyc-1 sshd\[5744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.204.63.133
...
2020-03-12 17:34:01
180.251.0.45 attackbotsspam
DATE:2020-03-12 04:45:45, IP:180.251.0.45, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-03-12 17:57:48
106.12.213.190 attackbots
$f2bV_matches
2020-03-12 17:52:18

Recently Reported IPs

102.80.154.233 102.80.38.29 102.80.161.175 102.80.179.177
102.80.160.7 102.80.108.188 102.80.172.53 102.80.48.193
102.8.99.178 102.80.157.25 102.80.126.219 102.8.9.225
102.8.88.215 102.80.103.224 102.8.94.218 102.8.68.190
102.80.147.97 102.8.35.89 102.8.246.254 102.8.26.97