Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.232.66.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.232.66.80.			IN	A

;; AUTHORITY SECTION:
.			412	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 179 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:30:01 CST 2022
;; MSG SIZE  rcvd: 106
Host info
80.66.232.138.in-addr.arpa domain name pointer dbis-faxe.uibk.ac.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.66.232.138.in-addr.arpa	name = dbis-faxe.uibk.ac.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.48.205.14 attackspam
Jul  5 20:09:00 vps65 sshd\[12741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.205.14  user=root
Jul  5 20:09:01 vps65 sshd\[12741\]: Failed password for root from 117.48.205.14 port 40366 ssh2
...
2019-07-06 03:40:28
185.93.3.114 attackbots
fell into ViewStateTrap:madrid
2019-07-06 03:20:12
103.133.175.242 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 22:44:25,572 INFO [shellcode_manager] (103.133.175.242) no match, writing hexdump (7132f0e3f27248dd761e061cb7498363 :2259918) - MS17010 (EternalBlue)
2019-07-06 03:30:40
125.105.36.179 attackspambots
WordpressAttack
2019-07-06 03:34:38
91.193.216.22 attack
[portscan] Port scan
2019-07-06 03:26:29
120.52.152.17 attack
05.07.2019 18:57:27 Connection to port 161 blocked by firewall
2019-07-06 03:28:31
95.81.0.51 attack
PORN SPAM !
2019-07-06 03:43:35
103.89.91.73 attackbots
Jun 21 01:57:26 mail postfix/postscreen[21150]: DNSBL rank 4 for [103.89.91.73]:50722
...
2019-07-06 03:14:27
110.232.80.10 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 16:14:40,752 INFO [shellcode_manager] (110.232.80.10) no match, writing hexdump (cfe9a82d005db1c5365251e437825b7f :2101845) - MS17010 (EternalBlue)
2019-07-06 03:59:07
123.206.219.211 attackbotsspam
Failed password for invalid user admin from 123.206.219.211 port 50675 ssh2
Invalid user lundi from 123.206.219.211 port 34826
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.219.211
Failed password for invalid user lundi from 123.206.219.211 port 34826 ssh2
Invalid user rw from 123.206.219.211 port 47217
2019-07-06 03:53:57
103.245.115.4 attackspambots
Jul  5 21:45:39 lnxmysql61 sshd[23901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.245.115.4
Jul  5 21:45:39 lnxmysql61 sshd[23901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.245.115.4
2019-07-06 03:48:30
185.244.25.89 attack
scan z
2019-07-06 03:54:29
178.128.162.10 attackbotsspam
Jul  5 14:20:58 aat-srv002 sshd[14999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.162.10
Jul  5 14:21:00 aat-srv002 sshd[14999]: Failed password for invalid user hadoop from 178.128.162.10 port 51344 ssh2
Jul  5 14:23:07 aat-srv002 sshd[15049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.162.10
Jul  5 14:23:09 aat-srv002 sshd[15049]: Failed password for invalid user avto from 178.128.162.10 port 48306 ssh2
...
2019-07-06 03:24:51
61.6.247.92 attack
IMAP brute force
...
2019-07-06 03:21:57
185.176.27.38 attackspam
05.07.2019 18:09:47 Connection to port 17497 blocked by firewall
2019-07-06 03:19:43

Recently Reported IPs

138.234.4.100 138.251.22.76 138.25.65.44 138.255.12.128
138.255.12.125 138.255.12.152 138.255.103.170 138.255.12.126
138.255.12.99 138.255.144.116 138.255.12.123 138.255.12.153
138.255.150.30 138.255.150.129 138.255.150.14 138.255.150.82
138.255.186.15 138.255.185.12 138.255.207.98 138.255.217.168