Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.204.80.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.204.80.169.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 20:13:47 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 169.80.204.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.80.204.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.199.84.201 attackbotsspam
Invalid user my from 128.199.84.201 port 36872
2020-04-22 15:19:01
66.171.12.56 attackbotsspam
Brute forcing email accounts
2020-04-22 15:16:25
112.196.97.85 attack
Brute force attempt
2020-04-22 15:48:55
181.48.114.82 attackbotsspam
Apr 22 05:07:00 XXXXXX sshd[2831]: Invalid user ftpuser from 181.48.114.82 port 51124
2020-04-22 15:11:51
200.31.19.206 attackspambots
(sshd) Failed SSH login from 200.31.19.206 (CO/Colombia/200.31.19-206.static.impsat.com.co): 5 in the last 3600 secs
2020-04-22 15:18:38
14.63.168.78 attackspambots
Apr 22 06:17:05 vps647732 sshd[1081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.168.78
Apr 22 06:17:07 vps647732 sshd[1081]: Failed password for invalid user postgres from 14.63.168.78 port 53100 ssh2
...
2020-04-22 15:13:55
51.141.110.138 attackspambots
$f2bV_matches
2020-04-22 15:33:30
117.247.86.117 attackspam
2020-04-22T09:04:02.860974struts4.enskede.local sshd\[5760\]: Invalid user oracle from 117.247.86.117 port 45102
2020-04-22T09:04:02.867704struts4.enskede.local sshd\[5760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.247.86.117
2020-04-22T09:04:06.098645struts4.enskede.local sshd\[5760\]: Failed password for invalid user oracle from 117.247.86.117 port 45102 ssh2
2020-04-22T09:07:15.666715struts4.enskede.local sshd\[5796\]: Invalid user iy from 117.247.86.117 port 36244
2020-04-22T09:07:15.674979struts4.enskede.local sshd\[5796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.247.86.117
...
2020-04-22 15:43:27
180.76.54.251 attackbots
$f2bV_matches
2020-04-22 15:40:47
14.185.214.177 attackspambots
prod3
...
2020-04-22 15:48:32
140.186.20.218 attack
Brute forcing email accounts
2020-04-22 15:29:59
217.30.175.101 attackspambots
DATE:2020-04-22 05:52:50, IP:217.30.175.101, PORT:ssh SSH brute force auth (docker-dc)
2020-04-22 15:51:48
117.214.13.173 attackbotsspam
$f2bV_matches
2020-04-22 15:35:59
129.226.174.139 attackspambots
Invalid user oracle from 129.226.174.139 port 49708
2020-04-22 15:50:15
112.64.33.38 attack
Invalid user admin from 112.64.33.38 port 43180
2020-04-22 15:44:25

Recently Reported IPs

30.96.149.7 66.254.120.16 243.146.119.201 26.20.5.203
223.216.20.240 46.4.9.187 93.251.93.148 72.145.80.147
132.32.98.209 192.45.125.87 211.86.35.35 225.5.77.15
222.225.247.229 139.222.179.60 225.56.249.158 173.63.53.212
7.5.165.221 107.81.18.170 66.173.13.108 26.244.109.193