Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berlin

Region: Land Berlin

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
130.149.80.199 attack
Automatic report - Banned IP Access
2020-09-09 20:34:03
130.149.80.199 attackspam
Automatic report - Banned IP Access
2020-09-09 14:30:49
130.149.80.199 attackspam
Automatic report - Banned IP Access
2020-09-09 06:42:58
130.149.80.199 attack
SQL Injection Attempts
2020-08-06 17:31:32
130.149.80.199 attack
Automatic report - Banned IP Access
2020-08-01 16:15:20
130.149.80.199 attackspam
23.04.2020 05:56:10 - Wordpress fail 
Detected by ELinOX-ALM
2020-04-23 12:14:40
130.149.80.199 attackspam
DE_RIPE_<177>1579841520 [1:2522007:3950] ET TOR Known Tor Relay/Router (Not Exit) Node TCP Traffic group 8 [Classification: Misc Attack] [Priority: 2] {TCP} 130.149.80.199:45420
2020-01-24 19:57:33
130.149.80.199 attackbots
Automatic report - XMLRPC Attack
2019-10-04 22:37:23
130.149.80.199 attackbots
goldgier-uhren-ankauf.de:80 130.149.80.199 - - \[21/Sep/2019:11:40:00 +0200\] "POST /xmlrpc.php HTTP/1.0" 301 515 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_13_6\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/69.0.3497.81 Safari/537.36"
goldgier-uhren-ankauf.de 130.149.80.199 \[21/Sep/2019:11:40:01 +0200\] "POST /xmlrpc.php HTTP/1.0" 302 3617 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_13_6\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/69.0.3497.81 Safari/537.36"
2019-09-21 19:43:17
130.149.80.199 attack
Wordpress attack
2019-07-14 07:39:54
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 130.149.80.76
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39638
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;130.149.80.76.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 17:47:42 CST 2021
;; MSG SIZE  rcvd: 42

'
Host info
76.80.149.130.in-addr.arpa domain name pointer telco.nue.tu-berlin.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
76.80.149.130.in-addr.arpa	name = telco.nue.tu-berlin.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.128.217.218 attackspam
WordPress brute force
2019-10-14 07:16:39
222.186.15.110 attackspambots
Oct 14 04:56:51 areeb-Workstation sshd[10185]: Failed password for root from 222.186.15.110 port 57123 ssh2
Oct 14 04:56:53 areeb-Workstation sshd[10185]: Failed password for root from 222.186.15.110 port 57123 ssh2
...
2019-10-14 07:27:20
81.241.235.191 attackspambots
Oct 13 13:27:11 eddieflores sshd\[19058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235-241-81.adsl-static.isp.belgacom.be  user=root
Oct 13 13:27:13 eddieflores sshd\[19058\]: Failed password for root from 81.241.235.191 port 58900 ssh2
Oct 13 13:30:48 eddieflores sshd\[19343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235-241-81.adsl-static.isp.belgacom.be  user=root
Oct 13 13:30:50 eddieflores sshd\[19343\]: Failed password for root from 81.241.235.191 port 41604 ssh2
Oct 13 13:34:19 eddieflores sshd\[19639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235-241-81.adsl-static.isp.belgacom.be  user=root
2019-10-14 07:46:08
68.183.104.230 attackbots
Oct 13 19:33:30 xtremcommunity sshd\[492262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.230  user=root
Oct 13 19:33:32 xtremcommunity sshd\[492262\]: Failed password for root from 68.183.104.230 port 41476 ssh2
Oct 13 19:37:22 xtremcommunity sshd\[492345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.230  user=root
Oct 13 19:37:23 xtremcommunity sshd\[492345\]: Failed password for root from 68.183.104.230 port 52034 ssh2
Oct 13 19:41:07 xtremcommunity sshd\[492489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.230  user=root
...
2019-10-14 07:46:56
217.61.14.223 attackspam
Feb 15 17:37:48 vtv3 sshd\[16831\]: Invalid user test from 217.61.14.223 port 55372
Feb 15 17:37:48 vtv3 sshd\[16831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.14.223
Feb 15 17:37:50 vtv3 sshd\[16831\]: Failed password for invalid user test from 217.61.14.223 port 55372 ssh2
Feb 15 17:46:01 vtv3 sshd\[19390\]: Invalid user events from 217.61.14.223 port 45686
Feb 15 17:46:01 vtv3 sshd\[19390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.14.223
Feb 19 04:25:07 vtv3 sshd\[30370\]: Invalid user marcela from 217.61.14.223 port 57194
Feb 19 04:25:07 vtv3 sshd\[30370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.14.223
Feb 19 04:25:10 vtv3 sshd\[30370\]: Failed password for invalid user marcela from 217.61.14.223 port 57194 ssh2
Feb 19 04:33:14 vtv3 sshd\[32428\]: Invalid user bscw from 217.61.14.223 port 47468
Feb 19 04:33:14 vtv3 sshd\[32428\]: pam
2019-10-14 07:29:24
167.71.64.9 attackbots
Sep 14 19:54:46 yesfletchmain sshd\[4947\]: Invalid user normaluser from 167.71.64.9 port 50262
Sep 14 19:54:46 yesfletchmain sshd\[4947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.64.9
Sep 14 19:54:48 yesfletchmain sshd\[4947\]: Failed password for invalid user normaluser from 167.71.64.9 port 50262 ssh2
Sep 14 19:58:16 yesfletchmain sshd\[5038\]: Invalid user kelby from 167.71.64.9 port 35514
Sep 14 19:58:16 yesfletchmain sshd\[5038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.64.9
...
2019-10-14 07:50:55
125.212.212.226 attackbots
Oct 13 13:11:11 hpm sshd\[14203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.212.226  user=root
Oct 13 13:11:13 hpm sshd\[14203\]: Failed password for root from 125.212.212.226 port 41882 ssh2
Oct 13 13:15:51 hpm sshd\[14572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.212.226  user=root
Oct 13 13:15:52 hpm sshd\[14572\]: Failed password for root from 125.212.212.226 port 54610 ssh2
Oct 13 13:20:28 hpm sshd\[14938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.212.226  user=root
2019-10-14 07:39:42
118.174.45.29 attack
Oct 14 00:13:33 dev0-dcde-rnet sshd[946]: Failed password for root from 118.174.45.29 port 54920 ssh2
Oct 14 00:18:12 dev0-dcde-rnet sshd[970]: Failed password for root from 118.174.45.29 port 37570 ssh2
2019-10-14 07:40:27
222.186.175.154 attackbotsspam
$f2bV_matches
2019-10-14 07:25:22
185.90.116.84 attackspam
10/13/2019-17:14:51.174330 185.90.116.84 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-14 07:34:59
222.186.175.148 attackbots
2019-10-13T23:12:44.923036abusebot-5.cloudsearch.cf sshd\[13229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
2019-10-14 07:25:45
183.131.82.99 attackspambots
2019-10-13T23:34:01.155296abusebot-3.cloudsearch.cf sshd\[16239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.82.99  user=root
2019-10-14 07:35:25
188.165.24.200 attack
Oct 14 00:11:00 ovpn sshd\[9757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.24.200  user=root
Oct 14 00:11:03 ovpn sshd\[9757\]: Failed password for root from 188.165.24.200 port 56568 ssh2
Oct 14 00:26:25 ovpn sshd\[26838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.24.200  user=root
Oct 14 00:26:27 ovpn sshd\[26838\]: Failed password for root from 188.165.24.200 port 49600 ssh2
Oct 14 00:29:50 ovpn sshd\[27468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.24.200  user=root
2019-10-14 07:52:08
182.61.36.38 attackspambots
Oct 14 06:12:59 webhost01 sshd[14800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.36.38
Oct 14 06:13:01 webhost01 sshd[14800]: Failed password for invalid user FAKEPASS from 182.61.36.38 port 45914 ssh2
...
2019-10-14 07:35:46
157.230.137.87 attackspambots
Wordpress Admin Login attack
2019-10-14 07:17:10

Recently Reported IPs

82.65.104.215 68.55.34.240 213.55.226.11 117.234.88.47
109.36.130.228 185.62.253.1 2402:8100:213d:eae5:38b0:f8b9:7f88:ac53 197.156.103.248
88.130.157.210 167.71.177.180 2604:a880:800:c1::2b6:b001 201.217.241.136
189.243.23.76 189.243.23.235 189.243.23.149 80.146.141.137
193.32.126.152 164.68.111.235 78.31.92.71 78.31.92.61