Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.56.133.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3212
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.56.133.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:20:35 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 80.133.56.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.133.56.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
220.133.18.137 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-08-08 23:19:47
71.6.232.5 attack
 TCP (SYN) 71.6.232.5:46757 -> port 3306, len 44
2020-08-08 23:29:22
182.18.208.118 attackspam
(sshd) Failed SSH login from 182.18.208.118 (PH/Philippines/-): 5 in the last 3600 secs
2020-08-08 23:20:33
111.72.195.70 attackspam
Aug  8 16:43:03 srv01 postfix/smtpd\[880\]: warning: unknown\[111.72.195.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 16:43:15 srv01 postfix/smtpd\[880\]: warning: unknown\[111.72.195.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 16:43:32 srv01 postfix/smtpd\[880\]: warning: unknown\[111.72.195.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 16:43:53 srv01 postfix/smtpd\[880\]: warning: unknown\[111.72.195.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 16:44:08 srv01 postfix/smtpd\[880\]: warning: unknown\[111.72.195.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-08 23:10:57
168.205.43.235 attackspam
Unauthorized connection attempt from IP address 168.205.43.235 on Port 445(SMB)
2020-08-08 23:13:27
167.71.201.137 attackbotsspam
$f2bV_matches
2020-08-08 23:38:12
36.91.137.202 attackspambots
Unauthorized connection attempt from IP address 36.91.137.202 on Port 445(SMB)
2020-08-08 23:27:51
87.110.115.239 attackspambots
87.110.115.239 - - [08/Aug/2020:14:14:58 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
87.110.115.239 - - [08/Aug/2020:14:14:59 +0100] "POST /wp-login.php HTTP/1.1" 200 6023 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
87.110.115.239 - - [08/Aug/2020:14:17:16 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
...
2020-08-08 23:00:27
111.229.228.45 attack
Aug  8 16:28:06 mout sshd[9469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.228.45  user=root
Aug  8 16:28:09 mout sshd[9469]: Failed password for root from 111.229.228.45 port 42098 ssh2
2020-08-08 22:58:12
112.85.42.232 attack
Aug  8 17:29:25 abendstille sshd\[16697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Aug  8 17:29:26 abendstille sshd\[16733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Aug  8 17:29:27 abendstille sshd\[16697\]: Failed password for root from 112.85.42.232 port 59614 ssh2
Aug  8 17:29:28 abendstille sshd\[16733\]: Failed password for root from 112.85.42.232 port 58742 ssh2
Aug  8 17:29:29 abendstille sshd\[16697\]: Failed password for root from 112.85.42.232 port 59614 ssh2
...
2020-08-08 23:34:11
103.203.176.210 attack
Unauthorized connection attempt from IP address 103.203.176.210 on Port 445(SMB)
2020-08-08 23:22:11
77.247.108.119 attack
[Mon Jul 13 20:52:05 2020] - Syn Flood From IP: 77.247.108.119 Port: 56378
2020-08-08 23:12:49
102.164.230.10 attackspambots
Unauthorized connection attempt from IP address 102.164.230.10 on Port 445(SMB)
2020-08-08 23:06:10
110.43.50.229 attackspam
2020-08-08T13:02:58.526343ionos.janbro.de sshd[119162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.50.229  user=root
2020-08-08T13:03:00.442108ionos.janbro.de sshd[119162]: Failed password for root from 110.43.50.229 port 11176 ssh2
2020-08-08T13:08:36.551743ionos.janbro.de sshd[119173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.50.229  user=root
2020-08-08T13:08:38.534502ionos.janbro.de sshd[119173]: Failed password for root from 110.43.50.229 port 5842 ssh2
2020-08-08T13:13:59.840701ionos.janbro.de sshd[119215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.50.229  user=root
2020-08-08T13:14:01.831966ionos.janbro.de sshd[119215]: Failed password for root from 110.43.50.229 port 65016 ssh2
2020-08-08T13:19:27.938508ionos.janbro.de sshd[119248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=11
...
2020-08-08 23:37:26
116.104.137.107 attack
Unauthorized connection attempt from IP address 116.104.137.107 on Port 445(SMB)
2020-08-08 23:12:34

Recently Reported IPs

49.249.42.171 242.125.139.168 213.164.156.111 71.202.160.16
134.242.82.106 232.215.159.216 20.150.64.151 224.35.243.155
155.100.231.96 104.150.125.230 109.243.89.36 40.70.176.77
25.231.236.23 61.64.77.5 39.152.144.183 18.254.153.191
88.127.239.234 123.210.164.29 154.107.138.40 142.39.20.214