Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.71.238.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.71.238.80.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 14:45:53 CST 2025
;; MSG SIZE  rcvd: 106
Host info
80.238.71.148.in-addr.arpa domain name pointer 80.238.71.148.rev.vodafone.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.238.71.148.in-addr.arpa	name = 80.238.71.148.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.7.187.108 attack
Automatic report - XMLRPC Attack
2019-11-12 14:55:12
106.13.120.46 attackspam
Nov 12 07:40:27 zulu412 sshd\[15146\]: Invalid user esta from 106.13.120.46 port 57728
Nov 12 07:40:27 zulu412 sshd\[15146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.120.46
Nov 12 07:40:29 zulu412 sshd\[15146\]: Failed password for invalid user esta from 106.13.120.46 port 57728 ssh2
...
2019-11-12 15:03:37
194.87.238.29 attack
Nov 12 06:41:39 124388 sshd[32260]: Invalid user engelmann from 194.87.238.29 port 33150
Nov 12 06:41:39 124388 sshd[32260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.87.238.29
Nov 12 06:41:39 124388 sshd[32260]: Invalid user engelmann from 194.87.238.29 port 33150
Nov 12 06:41:41 124388 sshd[32260]: Failed password for invalid user engelmann from 194.87.238.29 port 33150 ssh2
Nov 12 06:45:26 124388 sshd[32282]: Invalid user benth from 194.87.238.29 port 42358
2019-11-12 14:59:14
85.144.226.170 attack
Nov 12 07:58:58 dedicated sshd[28938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.144.226.170  user=root
Nov 12 07:59:00 dedicated sshd[28938]: Failed password for root from 85.144.226.170 port 36580 ssh2
2019-11-12 15:14:39
209.17.97.114 attackspam
209.17.97.114 was recorded 5 times by 5 hosts attempting to connect to the following ports: 30303,110,443. Incident counter (4h, 24h, all-time): 5, 27, 257
2019-11-12 14:59:02
128.199.133.249 attackbots
IP blocked
2019-11-12 15:01:45
2607:5300:60:e28::1 attackspam
Automatic report - XMLRPC Attack
2019-11-12 15:09:04
81.22.45.48 attackspam
2019-11-12T08:05:04.752156+01:00 lumpi kernel: [3364681.983599] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.48 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=10118 PROTO=TCP SPT=40318 DPT=3940 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-12 15:06:31
207.154.232.160 attackbots
Nov 12 06:40:25 thevastnessof sshd[30055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.232.160
...
2019-11-12 15:10:37
192.99.28.247 attackspam
2019-11-12T00:17:28.3766701495-001 sshd\[52884\]: Failed password for invalid user guest from 192.99.28.247 port 35181 ssh2
2019-11-12T01:18:44.7327661495-001 sshd\[54911\]: Invalid user spg123 from 192.99.28.247 port 36969
2019-11-12T01:18:44.7403051495-001 sshd\[54911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.28.247
2019-11-12T01:18:46.8991481495-001 sshd\[54911\]: Failed password for invalid user spg123 from 192.99.28.247 port 36969 ssh2
2019-11-12T01:22:29.7505931495-001 sshd\[55031\]: Invalid user 1230 from 192.99.28.247 port 55344
2019-11-12T01:22:29.7608111495-001 sshd\[55031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.28.247
...
2019-11-12 14:59:47
35.237.108.17 attack
Nov 12 11:28:51 gw1 sshd[6075]: Failed password for root from 35.237.108.17 port 38664 ssh2
Nov 12 11:32:24 gw1 sshd[6171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.237.108.17
...
2019-11-12 15:23:20
222.186.180.223 attackbots
Nov 12 01:46:29 ny01 sshd[27018]: Failed password for root from 222.186.180.223 port 37324 ssh2
Nov 12 01:46:33 ny01 sshd[27018]: Failed password for root from 222.186.180.223 port 37324 ssh2
Nov 12 01:46:37 ny01 sshd[27018]: Failed password for root from 222.186.180.223 port 37324 ssh2
Nov 12 01:46:42 ny01 sshd[27018]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 37324 ssh2 [preauth]
2019-11-12 14:48:28
41.242.1.163 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-12 15:28:34
112.112.7.202 attackbotsspam
2019-11-12T06:32:06.122927abusebot-8.cloudsearch.cf sshd\[29474\]: Invalid user bkandeh from 112.112.7.202 port 54358
2019-11-12 15:12:37
173.208.206.139 attackspambots
[ 🇺🇸 ] From contato@panfox.com.br Mon Nov 11 22:40:25 2019
 Received: from jumpiro.panfox.com.br ([173.208.206.139]:51634)
2019-11-12 15:00:36

Recently Reported IPs

5.185.52.171 47.60.51.77 163.51.29.61 94.215.64.71
101.58.40.92 254.42.107.19 103.235.98.130 179.30.56.40
109.2.209.112 167.215.231.216 34.240.13.39 57.179.198.76
95.127.213.118 23.175.111.123 31.228.158.159 185.253.19.18
196.30.29.35 25.38.185.49 227.149.88.11 243.101.97.155