Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.98.80.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.98.80.191.			IN	A

;; AUTHORITY SECTION:
.			418	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 11:54:27 CST 2022
;; MSG SIZE  rcvd: 106
Host info
191.80.98.134.in-addr.arpa domain name pointer static-191-80.windrz.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
191.80.98.134.in-addr.arpa	name = static-191-80.windrz.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.244.138.21 attack
" "
2019-07-09 07:51:58
209.58.186.26 attackbotsspam
(From raphaeMek@gmail.com) Hello!  schofieldhealthsolutions.com 
 
We propose 
 
Sending your commercial offer through the Contact us form which can be found on the sites in the Communication partition. Feedback forms are filled in by our program and the captcha is solved. The advantage of this method is that messages sent through feedback forms are whitelisted. This technique raise the chances that your message will be read. 
 
Our database contains more than 25 million sites around the world to which we can send your message. 
 
The cost of one million messages 49 USD 
 
FREE TEST mailing of 50,000 messages to any country of your choice. 
 
 
This message is automatically generated to use our contacts for communication. 
 
 
 
Contact us. 
Telegram - @FeedbackFormEU 
Skype  FeedbackForm2019 
WhatsApp - +44 7598 509161 
Email - FeedbackForm@make-success.com
2019-07-09 07:53:43
68.180.119.231 attack
Jul  9 01:42:51 mout sshd[17387]: Invalid user admin1234 from 68.180.119.231 port 59346
2019-07-09 07:48:32
191.240.89.63 attackbotsspam
failed_logins
2019-07-09 08:10:07
66.70.188.25 attack
Jul  8 22:49:42 icinga sshd[16951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.188.25
Jul  8 22:49:44 icinga sshd[16951]: Failed password for invalid user kathleen from 66.70.188.25 port 46464 ssh2
...
2019-07-09 07:45:59
144.217.165.133 attackbotsspam
Jul  8 21:56:00 mail sshd\[5758\]: Invalid user admin from 144.217.165.133
Jul  8 21:56:00 mail sshd\[5758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.165.133
Jul  8 21:56:02 mail sshd\[5758\]: Failed password for invalid user admin from 144.217.165.133 port 48212 ssh2
...
2019-07-09 08:07:51
201.20.73.195 attackbots
Brute force SMTP login attempted.
...
2019-07-09 08:10:59
1.71.129.210 attack
$f2bV_matches
2019-07-09 07:52:28
92.222.7.129 attackspambots
Port scan on 1 port(s): 445
2019-07-09 08:04:49
212.64.59.94 attack
Jul  8 19:50:44 localhost sshd\[3404\]: Invalid user admin from 212.64.59.94 port 34785
Jul  8 19:50:44 localhost sshd\[3404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.59.94
Jul  8 19:50:46 localhost sshd\[3404\]: Failed password for invalid user admin from 212.64.59.94 port 34785 ssh2
Jul  8 19:52:18 localhost sshd\[3495\]: Invalid user admin from 212.64.59.94 port 50243
Jul  8 19:52:18 localhost sshd\[3495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.59.94
...
2019-07-09 08:06:53
185.36.81.129 attack
Jul  8 20:40:04 v22018076622670303 sshd\[7192\]: Invalid user stats from 185.36.81.129 port 52924
Jul  8 20:40:04 v22018076622670303 sshd\[7192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.36.81.129
Jul  8 20:40:06 v22018076622670303 sshd\[7192\]: Failed password for invalid user stats from 185.36.81.129 port 52924 ssh2
...
2019-07-09 07:35:34
138.197.72.48 attackbotsspam
2019-07-08T23:48:07.959736abusebot-8.cloudsearch.cf sshd\[16361\]: Invalid user cyrus from 138.197.72.48 port 49494
2019-07-09 07:57:58
138.197.105.79 attackspambots
Jul  9 01:03:03 debian sshd\[31397\]: Invalid user ryan from 138.197.105.79 port 33680
Jul  9 01:03:03 debian sshd\[31397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.105.79
...
2019-07-09 08:14:01
41.47.47.16 attackspam
Caught in portsentry honeypot
2019-07-09 07:50:58
142.93.59.240 attackspambots
2019-07-08T23:53:11.380912abusebot-5.cloudsearch.cf sshd\[11223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.59.240  user=root
2019-07-09 07:55:40

Recently Reported IPs

137.86.21.92 159.69.189.137 227.17.133.43 120.11.90.95
3.231.150.89 127.91.55.173 179.244.28.206 125.175.48.95
220.244.142.108 11.61.152.116 64.23.146.206 49.236.123.156
130.82.154.8 223.246.136.144 129.151.222.90 225.214.58.89
239.237.92.161 43.35.206.209 137.44.167.195 5.147.149.95