Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.2.80.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.2.80.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022401 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 13:29:28 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 164.80.2.148.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 148.2.80.164.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.186.190.17 attackspam
Feb 11 19:42:50 ip-172-31-62-245 sshd\[10898\]: Failed password for root from 222.186.190.17 port 19324 ssh2\
Feb 11 19:44:46 ip-172-31-62-245 sshd\[10906\]: Failed password for root from 222.186.190.17 port 54402 ssh2\
Feb 11 19:46:01 ip-172-31-62-245 sshd\[10915\]: Failed password for root from 222.186.190.17 port 19659 ssh2\
Feb 11 19:47:16 ip-172-31-62-245 sshd\[10921\]: Failed password for root from 222.186.190.17 port 41873 ssh2\
Feb 11 19:48:31 ip-172-31-62-245 sshd\[10929\]: Failed password for root from 222.186.190.17 port 10856 ssh2\
2020-02-12 04:30:23
175.174.200.127 attackbots
firewall-block, port(s): 23/tcp
2020-02-12 05:06:34
78.208.164.132 attackspambots
Unauthorized connection attempt detected from IP address 78.208.164.132 to port 445
2020-02-12 04:34:56
185.86.164.107 attack
WordPress login Brute force / Web App Attack on client site.
2020-02-12 05:00:38
156.218.177.222 attackbots
ssh failed login
2020-02-12 04:49:07
119.117.43.68 attack
Port 1433 Scan
2020-02-12 04:39:44
211.205.95.8 attackbotsspam
1581428449 - 02/11/2020 14:40:49 Host: 211.205.95.8/211.205.95.8 Port: 445 TCP Blocked
2020-02-12 04:37:52
167.114.98.234 attackspam
$f2bV_matches
2020-02-12 04:32:32
49.71.124.210 attack
Invalid user nov from 49.71.124.210 port 22924
2020-02-12 04:28:00
112.85.42.174 attackspambots
Feb 11 20:00:30 124388 sshd[6748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Feb 11 20:00:32 124388 sshd[6748]: Failed password for root from 112.85.42.174 port 26854 ssh2
Feb 11 20:00:47 124388 sshd[6748]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 26854 ssh2 [preauth]
Feb 11 20:00:51 124388 sshd[6750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Feb 11 20:00:53 124388 sshd[6750]: Failed password for root from 112.85.42.174 port 59998 ssh2
2020-02-12 04:26:18
162.243.131.51 attack
" "
2020-02-12 04:24:07
213.169.39.218 attackbots
Feb 11 21:07:53 ns382633 sshd\[21780\]: Invalid user saravathi from 213.169.39.218 port 33064
Feb 11 21:07:53 ns382633 sshd\[21780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.169.39.218
Feb 11 21:07:56 ns382633 sshd\[21780\]: Failed password for invalid user saravathi from 213.169.39.218 port 33064 ssh2
Feb 11 21:15:58 ns382633 sshd\[23505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.169.39.218  user=root
Feb 11 21:16:00 ns382633 sshd\[23505\]: Failed password for root from 213.169.39.218 port 55328 ssh2
2020-02-12 05:01:20
182.48.77.202 attackspambots
firewall-block, port(s): 1433/tcp
2020-02-12 04:22:30
179.186.168.89 attack
Unauthorized connection attempt detected from IP address 179.186.168.89 to port 23
2020-02-12 05:06:09
43.229.224.138 attackbotsspam
1581428435 - 02/11/2020 14:40:35 Host: 43.229.224.138/43.229.224.138 Port: 445 TCP Blocked
2020-02-12 04:46:53

Recently Reported IPs

75.195.211.86 192.215.204.8 137.173.202.102 118.92.104.71
171.66.72.216 136.85.20.31 70.161.163.94 153.138.153.44
92.44.149.53 55.191.20.145 137.206.98.30 231.31.42.104
211.13.227.66 185.81.237.45 162.60.88.27 90.185.181.16
197.164.89.231 88.137.112.210 22.174.216.46 86.27.140.191