Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.80.248.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2454
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.80.248.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 09:08:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 11.248.80.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.248.80.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.32.166.41 attackbotsspam
(cpanel) Failed cPanel login from 187.32.166.41 (BR/Brazil/187-032-166-041.static.ctbctelecom.com.br): 5 in the last 3600 secs; ID: luc
2020-07-11 15:59:32
49.150.125.204 attackbots
Automatic report - XMLRPC Attack
2020-07-11 15:38:12
219.250.188.134 attackbotsspam
Jul 11 03:30:09 XXXXXX sshd[14494]: Invalid user chang from 219.250.188.134 port 44976
2020-07-11 16:19:01
54.37.235.195 attackspam
Jul 10 02:15:03 ns sshd[28880]: Connection from 54.37.235.195 port 44404 on 134.119.39.98 port 22
Jul 10 02:15:03 ns sshd[28880]: Invalid user stepan from 54.37.235.195 port 44404
Jul 10 02:15:03 ns sshd[28880]: Failed password for invalid user stepan from 54.37.235.195 port 44404 ssh2
Jul 10 02:15:03 ns sshd[28880]: Received disconnect from 54.37.235.195 port 44404:11: Bye Bye [preauth]
Jul 10 02:15:03 ns sshd[28880]: Disconnected from 54.37.235.195 port 44404 [preauth]
Jul 10 02:34:48 ns sshd[23052]: Connection from 54.37.235.195 port 39136 on 134.119.39.98 port 22
Jul 10 02:34:53 ns sshd[23052]: Invalid user dexter from 54.37.235.195 port 39136
Jul 10 02:34:53 ns sshd[23052]: Failed password for invalid user dexter from 54.37.235.195 port 39136 ssh2
Jul 10 02:34:53 ns sshd[23052]: Received disconnect from 54.37.235.195 port 39136:11: Bye Bye [preauth]
Jul 10 02:34:53 ns sshd[23052]: Disconnected from 54.37.235.195 port 39136 [preauth]
Jul 10 02:40:44 ns sshd[27915]: ........
-------------------------------
2020-07-11 16:08:07
58.211.27.68 attack
07/10/2020-23:53:28.514701 58.211.27.68 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-07-11 15:55:13
175.140.138.193 attack
$f2bV_matches
2020-07-11 15:44:12
144.217.42.212 attack
Jul 11 08:53:42 rancher-0 sshd[248002]: Invalid user peyton from 144.217.42.212 port 55740
...
2020-07-11 16:18:13
39.89.216.160 attack
1594439602 - 07/11/2020 05:53:22 Host: 39.89.216.160/39.89.216.160 Port: 23 TCP Blocked
2020-07-11 15:59:02
190.187.112.3 attackspambots
$f2bV_matches
2020-07-11 15:46:11
182.61.133.172 attackbots
Jul 11 07:56:24 ift sshd\[35020\]: Invalid user leyener from 182.61.133.172Jul 11 07:56:26 ift sshd\[35020\]: Failed password for invalid user leyener from 182.61.133.172 port 58960 ssh2Jul 11 07:59:32 ift sshd\[35643\]: Invalid user ammin from 182.61.133.172Jul 11 07:59:34 ift sshd\[35643\]: Failed password for invalid user ammin from 182.61.133.172 port 43092 ssh2Jul 11 08:03:02 ift sshd\[36305\]: Invalid user support from 182.61.133.172
...
2020-07-11 15:54:01
159.203.242.122 attackbotsspam
srv02 Mass scanning activity detected Target: 22953  ..
2020-07-11 16:03:02
178.62.76.138 attackspambots
178.62.76.138 - - [11/Jul/2020:08:14:07 +0100] "POST /wp-login.php HTTP/1.1" 200 1792 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.62.76.138 - - [11/Jul/2020:08:14:08 +0100] "POST /wp-login.php HTTP/1.1" 200 1790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.62.76.138 - - [11/Jul/2020:08:14:08 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-11 15:51:49
90.84.69.4 attackbotsspam
Automatic report - XMLRPC Attack
2020-07-11 16:16:41
54.81.114.65 attack
Web-based SQL injection attempt
2020-07-11 16:17:17
146.88.240.4 attackbotsspam
07/11/2020-04:00:41.023036 146.88.240.4 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-07-11 16:03:53

Recently Reported IPs

169.55.156.232 191.161.249.49 83.18.93.3 50.189.133.28
77.157.253.233 170.42.142.163 250.49.217.124 75.21.247.46
207.209.19.181 136.105.250.17 123.225.150.118 205.207.146.179
62.74.54.35 6.183.226.30 243.160.213.200 84.165.46.254
67.166.70.147 40.253.69.40 254.94.174.55 122.159.83.206