Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.70.255.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53299
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.70.255.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 06:26:39 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 80.255.70.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.255.70.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.131.13.198 attack
$f2bV_matches
2020-09-27 17:19:19
193.70.21.159 attack
Sep 27 07:40:54 vlre-nyc-1 sshd\[21396\]: Invalid user user from 193.70.21.159
Sep 27 07:40:54 vlre-nyc-1 sshd\[21396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.21.159
Sep 27 07:40:56 vlre-nyc-1 sshd\[21396\]: Failed password for invalid user user from 193.70.21.159 port 43314 ssh2
Sep 27 07:45:36 vlre-nyc-1 sshd\[21530\]: Invalid user ftpuser from 193.70.21.159
Sep 27 07:45:36 vlre-nyc-1 sshd\[21530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.21.159
...
2020-09-27 17:02:37
81.68.147.60 attackspam
Invalid user alice from 81.68.147.60 port 57448
2020-09-27 16:43:43
61.133.232.250 attack
Sep 27 07:36:41 ns381471 sshd[31625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.250
Sep 27 07:36:43 ns381471 sshd[31625]: Failed password for invalid user ma from 61.133.232.250 port 62809 ssh2
2020-09-27 17:04:57
49.234.99.246 attackbots
Sep 27 10:27:25 h2646465 sshd[751]: Invalid user tester from 49.234.99.246
Sep 27 10:27:25 h2646465 sshd[751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.99.246
Sep 27 10:27:25 h2646465 sshd[751]: Invalid user tester from 49.234.99.246
Sep 27 10:27:27 h2646465 sshd[751]: Failed password for invalid user tester from 49.234.99.246 port 35024 ssh2
Sep 27 10:40:08 h2646465 sshd[2485]: Invalid user myftp from 49.234.99.246
Sep 27 10:40:08 h2646465 sshd[2485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.99.246
Sep 27 10:40:08 h2646465 sshd[2485]: Invalid user myftp from 49.234.99.246
Sep 27 10:40:10 h2646465 sshd[2485]: Failed password for invalid user myftp from 49.234.99.246 port 56588 ssh2
Sep 27 10:43:08 h2646465 sshd[2788]: Invalid user upgrade from 49.234.99.246
...
2020-09-27 17:14:43
185.123.164.54 attackbots
<6 unauthorized SSH connections
2020-09-27 17:24:16
117.2.185.158 attackspambots
Automatic report - Port Scan Attack
2020-09-27 17:17:52
171.244.51.114 attackbots
prod8
...
2020-09-27 17:13:42
151.80.183.134 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-27 17:20:06
112.140.185.246 attackbots
(sshd) Failed SSH login from 112.140.185.246 (SG/Singapore/server.m-anant.com): 5 in the last 3600 secs
2020-09-27 17:14:28
68.183.148.159 attack
Invalid user nathan from 68.183.148.159 port 46971
2020-09-27 17:04:13
124.160.96.249 attackbots
2020-09-27T11:06:32.609873mail.broermann.family sshd[622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249
2020-09-27T11:06:32.605501mail.broermann.family sshd[622]: Invalid user daniella from 124.160.96.249 port 38290
2020-09-27T11:06:33.791816mail.broermann.family sshd[622]: Failed password for invalid user daniella from 124.160.96.249 port 38290 ssh2
2020-09-27T11:09:55.145341mail.broermann.family sshd[901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249  user=root
2020-09-27T11:09:56.864959mail.broermann.family sshd[901]: Failed password for root from 124.160.96.249 port 33012 ssh2
...
2020-09-27 17:17:19
80.211.72.188 attack
Sep 26 17:12:39 dax sshd[14903]: reveeclipse mapping checking getaddrinfo for host188-72-211-80.serverdedicati.aruba.hostname [80.211.72.188] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 26 17:12:39 dax sshd[14903]: Invalid user user from 80.211.72.188
Sep 26 17:12:39 dax sshd[14903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.72.188 
Sep 26 17:12:41 dax sshd[14903]: Failed password for invalid user user from 80.211.72.188 port 33254 ssh2
Sep 26 17:12:41 dax sshd[14903]: Received disconnect from 80.211.72.188: 11: Bye Bye [preauth]
Sep 26 17:18:11 dax sshd[15681]: reveeclipse mapping checking getaddrinfo for host188-72-211-80.serverdedicati.aruba.hostname [80.211.72.188] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 26 17:18:11 dax sshd[15681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.72.188  user=r.r
Sep 26 17:18:14 dax sshd[15681]: Failed password for r.r from 80.211.72.188 ........
-------------------------------
2020-09-27 17:06:08
220.172.52.143 attack
Sep 27 00:58:46 www_kotimaassa_fi sshd[23560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.172.52.143
Sep 27 00:58:48 www_kotimaassa_fi sshd[23560]: Failed password for invalid user ftpuser from 220.172.52.143 port 24351 ssh2
...
2020-09-27 16:52:11
218.78.213.143 attackspambots
Invalid user shared from 218.78.213.143 port 17385
2020-09-27 16:51:15

Recently Reported IPs

229.113.7.151 254.245.235.169 88.155.244.77 36.35.71.136
67.228.234.181 125.185.225.64 211.128.152.77 20.87.118.127
191.145.19.87 236.100.153.36 175.140.9.53 239.214.67.97
177.132.229.182 140.131.138.246 163.140.96.93 178.11.16.183
155.218.61.194 29.128.75.231 255.26.243.28 39.221.58.38