Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.80.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4045
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.201.80.9.			IN	A

;; AUTHORITY SECTION:
.			402	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:29:43 CST 2022
;; MSG SIZE  rcvd: 105
Host info
9.80.201.138.in-addr.arpa domain name pointer php7.rootserver.ongema.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.80.201.138.in-addr.arpa	name = php7.rootserver.ongema.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
64.227.67.106 attackspam
Invalid user web from 64.227.67.106 port 47174
2020-07-12 21:37:50
106.13.110.74 attack
Jul 12 22:48:15 localhost sshd[4052800]: Connection closed by 106.13.110.74 port 52922 [preauth]
...
2020-07-12 21:32:40
177.124.184.44 attackspam
Invalid user glenn from 177.124.184.44 port 34758
2020-07-12 21:09:09
62.234.67.178 attackbots
Invalid user sandy from 62.234.67.178 port 38720
2020-07-12 21:38:41
61.133.232.252 attack
Automatic report BANNED IP
2020-07-12 21:38:58
150.95.138.39 attackspambots
Invalid user ht from 150.95.138.39 port 33592
2020-07-12 21:14:00
167.172.163.162 attackspambots
Invalid user teamspeak from 167.172.163.162 port 58952
2020-07-12 21:10:46
141.98.81.208 attack
Jul 12 13:08:28 marvibiene sshd[11649]: Invalid user Administrator from 141.98.81.208 port 18471
Jul 12 13:08:28 marvibiene sshd[11649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.208
Jul 12 13:08:28 marvibiene sshd[11649]: Invalid user Administrator from 141.98.81.208 port 18471
Jul 12 13:08:29 marvibiene sshd[11649]: Failed password for invalid user Administrator from 141.98.81.208 port 18471 ssh2
...
2020-07-12 21:16:22
111.11.181.53 attack
Invalid user xa from 111.11.181.53 port 14889
2020-07-12 21:31:33
141.98.9.137 attack
Jul 12 19:49:56 itv-usvr-02 sshd[17861]: Invalid user operator from 141.98.9.137 port 43222
2020-07-12 21:19:31
144.34.153.49 attackbotsspam
Invalid user vandusen from 144.34.153.49 port 59010
2020-07-12 21:14:59
109.100.61.19 attack
Invalid user rachelle from 109.100.61.19 port 48806
2020-07-12 21:32:24
116.105.222.70 attackbots
Jul 12 14:05:49 hell sshd[15886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.105.222.70
Jul 12 14:05:52 hell sshd[15886]: Failed password for invalid user dummy from 116.105.222.70 port 29220 ssh2
...
2020-07-12 21:29:34
120.239.196.46 attackbots
Invalid user wsm from 120.239.196.46 port 57754
2020-07-12 21:26:43
190.64.213.155 attackspam
Invalid user cyndi from 190.64.213.155 port 49064
2020-07-12 21:04:26

Recently Reported IPs

138.201.82.189 138.201.84.243 138.201.81.84 138.201.85.147
138.201.85.161 138.201.85.230 138.201.85.204 138.201.88.73
138.201.85.34 138.201.89.73 138.201.91.178 138.201.89.1
138.201.93.116 138.204.122.2 138.201.96.184 138.201.97.40
138.204.133.148 138.201.95.161 138.204.132.205 138.204.135.122