Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.123.100.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7633
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.123.100.80.			IN	A

;; AUTHORITY SECTION:
.			408	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 19:59:49 CST 2022
;; MSG SIZE  rcvd: 107
Host info
80.100.123.145.in-addr.arpa domain name pointer 145.123.early-registration.of.surfnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.100.123.145.in-addr.arpa	name = 145.123.early-registration.of.surfnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.194.83.99 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-19 23:09:01
200.98.162.85 attackbotsspam
Honeypot attack, port: 445, PTR: 200-98-162-85.clouduol.com.br.
2020-01-19 23:26:04
92.222.127.232 attack
Failed password for root from 92.222.127.232 port 44164 ssh2
Failed password for root from 92.222.127.232 port 44164 ssh2
Failed password for root from 92.222.127.232 port 44164 ssh2
Failed password for root from 92.222.127.232 port 44164 ssh2
2020-01-19 23:38:07
212.113.232.63 attackbotsspam
Fail2Ban Ban Triggered
2020-01-19 23:08:36
188.166.208.131 attackbots
Jan 19 15:00:53 vpn01 sshd[21409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.208.131
Jan 19 15:00:55 vpn01 sshd[21409]: Failed password for invalid user user from 188.166.208.131 port 53946 ssh2
...
2020-01-19 23:17:01
109.186.27.136 attackbotsspam
Unauthorized connection attempt detected from IP address 109.186.27.136 to port 23 [J]
2020-01-19 23:36:45
192.118.32.250 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-19 23:16:40
117.200.58.93 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-19 23:28:06
213.32.91.71 attackspam
213.32.91.71 - - [19/Jan/2020:13:57:03 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
213.32.91.71 - - [19/Jan/2020:13:57:03 +0100] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
213.32.91.71 - - [19/Jan/2020:13:57:04 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
213.32.91.71 - - [19/Jan/2020:13:57:04 +0100] "POST /wp-login.php HTTP/1.1" 200 1684 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
213.32.91.71 - - [19/Jan/2020:13:57:04 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
213.32.91.71 - - [19/Jan/2020:13:57:04 +0100] "POST /wp-login.php HTTP/1.1" 200 1688 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-01-19 23:40:21
180.175.193.129 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-19 23:24:46
42.3.20.248 attack
Honeypot attack, port: 5555, PTR: 42-3-20-248.static.netvigator.com.
2020-01-19 23:04:43
197.243.14.46 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-19 23:44:47
60.48.73.201 attack
Unauthorized connection attempt detected from IP address 60.48.73.201 to port 83 [J]
2020-01-19 23:20:17
201.108.133.169 attackbotsspam
Honeypot attack, port: 81, PTR: dsl-201-108-133-169.prod-dial.com.mx.
2020-01-19 23:21:56
105.235.133.116 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-19 23:33:22

Recently Reported IPs

151.92.14.68 113.251.168.124 11.104.241.114 108.22.3.183
250.97.170.130 27.251.166.221 159.59.89.228 148.10.25.78
211.175.215.110 129.45.254.28 7.90.113.117 242.158.201.216
244.195.164.77 137.249.232.19 21.114.252.78 142.98.11.100
11.127.33.62 100.87.104.204 186.255.86.168 105.133.200.8