Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.191.80.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53647
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.191.80.229.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 20:24:19 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 229.80.191.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 229.80.191.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.56.28.254 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-07 17:21:55
138.68.208.199 attackbotsspam
138.68.208.199 - - - [07/Sep/2019:05:25:32 +0000] "GET / HTTP/1.1" 404 162 "-" "Mozilla/5.0 zgrab/0.x" "-" "-"
2019-09-07 16:53:08
219.78.146.122 attackbots
Telnet Server BruteForce Attack
2019-09-07 17:20:09
91.204.188.50 attackbotsspam
Sep  6 21:50:17 php1 sshd\[4412\]: Invalid user debian from 91.204.188.50
Sep  6 21:50:17 php1 sshd\[4412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.204.188.50
Sep  6 21:50:19 php1 sshd\[4412\]: Failed password for invalid user debian from 91.204.188.50 port 48930 ssh2
Sep  6 21:55:21 php1 sshd\[8482\]: Invalid user jira from 91.204.188.50
Sep  6 21:55:21 php1 sshd\[8482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.204.188.50
2019-09-07 17:32:28
213.8.103.78 attackspambots
DATE:2019-09-07 06:13:58, IP:213.8.103.78, PORT:3306 - MySQL/MariaDB brute force auth on a honeypot server (epe-dc)
2019-09-07 17:02:04
23.253.173.172 attackspam
Brute force RDP, port 3389
2019-09-07 17:04:05
142.93.212.131 attackspam
Sep  7 06:47:37 intra sshd\[55378\]: Invalid user daniel from 142.93.212.131Sep  7 06:47:38 intra sshd\[55378\]: Failed password for invalid user daniel from 142.93.212.131 port 36104 ssh2Sep  7 06:52:31 intra sshd\[55464\]: Invalid user postgres from 142.93.212.131Sep  7 06:52:33 intra sshd\[55464\]: Failed password for invalid user postgres from 142.93.212.131 port 51000 ssh2Sep  7 06:57:30 intra sshd\[55548\]: Invalid user test from 142.93.212.131Sep  7 06:57:32 intra sshd\[55548\]: Failed password for invalid user test from 142.93.212.131 port 37670 ssh2
...
2019-09-07 17:09:10
203.114.102.69 attackspam
Sep  6 14:29:25 php1 sshd\[27676\]: Invalid user 123 from 203.114.102.69
Sep  6 14:29:25 php1 sshd\[27676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.114.102.69
Sep  6 14:29:27 php1 sshd\[27676\]: Failed password for invalid user 123 from 203.114.102.69 port 41399 ssh2
Sep  6 14:34:16 php1 sshd\[28099\]: Invalid user postgres1 from 203.114.102.69
Sep  6 14:34:16 php1 sshd\[28099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.114.102.69
2019-09-07 17:08:25
184.105.247.250 attackspambots
scan z
2019-09-07 17:14:06
91.215.199.97 attack
[portscan] Port scan
2019-09-07 17:29:44
168.194.86.148 attackbots
scan z
2019-09-07 17:02:57
104.236.58.55 attack
$f2bV_matches
2019-09-07 16:48:00
165.22.242.104 attack
Sep  7 10:50:49 dedicated sshd[1691]: Invalid user user from 165.22.242.104 port 41580
2019-09-07 16:57:34
54.38.82.14 attackbotsspam
Sep  7 05:06:31 vps200512 sshd\[21467\]: Invalid user admin from 54.38.82.14
Sep  7 05:06:31 vps200512 sshd\[21467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14
Sep  7 05:06:34 vps200512 sshd\[21467\]: Failed password for invalid user admin from 54.38.82.14 port 37917 ssh2
Sep  7 05:06:35 vps200512 sshd\[21471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14  user=root
Sep  7 05:06:36 vps200512 sshd\[21471\]: Failed password for root from 54.38.82.14 port 41365 ssh2
2019-09-07 17:07:01
192.241.249.53 attack
Reported by AbuseIPDB proxy server.
2019-09-07 16:51:25

Recently Reported IPs

242.18.72.1 12.6.211.100 196.221.106.45 229.42.191.113
48.79.43.87 48.210.152.146 55.181.75.170 31.195.172.253
146.131.127.200 250.243.96.214 236.216.158.198 52.116.122.174
53.1.230.225 252.0.230.89 54.91.75.98 40.197.20.12
239.220.62.91 61.164.204.212 254.19.151.229 127.147.29.104