Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.80.80.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53248
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.80.80.146.			IN	A

;; AUTHORITY SECTION:
.			502	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 00:21:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
146.80.80.103.in-addr.arpa domain name pointer 146.80.80.103.jsn.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
146.80.80.103.in-addr.arpa	name = 146.80.80.103.jsn.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.52.83.21 attackspam
5500/tcp
[2019-06-21]1pkt
2019-06-22 05:25:20
164.132.56.243 attackspambots
Attempted SSH login
2019-06-22 05:46:00
41.96.51.87 attackspam
Brute force attempt
2019-06-22 05:37:31
95.46.138.98 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 05:46:54
89.252.172.164 attackspambots
SASL Brute Force
2019-06-22 05:56:40
200.196.41.183 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 05:35:10
179.186.246.14 attackspam
DATE:2019-06-21_21:44:35, IP:179.186.246.14, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-06-22 05:59:00
159.203.161.63 attackspambots
Request: "GET / HTTP/2.0"
2019-06-22 05:20:19
104.10.152.12 attackspam
Bad Request: "GET / HTTP/1.0"
2019-06-22 06:02:02
220.143.48.187 attack
37215/tcp
[2019-06-21]1pkt
2019-06-22 06:03:02
47.205.52.254 attackspam
Proxy Request: "GET http://httpheader.net/ HTTP/1.1" Bad Request: "\x04\x01\x00P\xC0c\xF660\x00" Bad Request: "\x04\x01\x00P\xC0c\xF660\x00" Bad Request: "\x05\x01\x00"
2019-06-22 05:37:52
109.201.154.161 attackspam
Bad Bot Request: "HEAD / HTTP/1.1" Agent: "Mozilla/5.0 (compatible; Uptimebot/1.0;  http://www.uptime.com/uptimebot)"
2019-06-22 05:25:51
18.215.155.208 attack
Request: "GET / HTTP/1.1"
2019-06-22 05:36:35
191.53.196.38 attackbots
SMTP-sasl brute force
...
2019-06-22 06:03:52
180.241.36.113 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 05:48:06

Recently Reported IPs

103.80.70.29 103.80.80.162 103.80.80.202 103.80.71.33
103.80.67.252 103.80.71.202 103.80.80.210 103.80.80.209
103.80.80.212 103.194.233.68 103.80.81.10 103.80.80.219
103.80.81.229 103.80.81.4 103.80.82.100 103.80.81.98
103.80.81.145 103.80.82.120 103.80.82.181 103.194.233.70