Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.163.199.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7503
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.163.199.80.			IN	A

;; AUTHORITY SECTION:
.			134	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102500 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 26 01:07:59 CST 2023
;; MSG SIZE  rcvd: 107
Host info
b'Host 80.199.163.152.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 80.199.163.152.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
92.222.92.114 attackbots
SSH Attack
2020-07-02 04:36:50
27.115.50.114 attackspam
Jul  1 00:56:22 mout sshd[27396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.50.114  user=root
Jul  1 00:56:24 mout sshd[27396]: Failed password for root from 27.115.50.114 port 25618 ssh2
2020-07-02 04:34:19
14.160.38.18 attack
...
2020-07-02 03:58:22
34.87.171.187 attack
Jun 30 22:11:48 mail sshd[27983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.87.171.187
Jun 30 22:11:50 mail sshd[27983]: Failed password for invalid user dan from 34.87.171.187 port 41850 ssh2
...
2020-07-02 04:32:09
159.89.157.126 attackbots
TCP ports : 21 / 23 / 110 / 502 / 993 / 1521 / 3306 / 5432 / 27017 / 47808
2020-07-02 03:53:02
141.98.81.207 attackspambots
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-02 04:07:31
81.95.238.180 attackspam
Unauthorized connection attempt detected from IP address 81.95.238.180 to port 5900
2020-07-02 03:34:45
51.77.200.101 attackbotsspam
Jun 30 21:44:09 game-panel sshd[23636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.200.101
Jun 30 21:44:11 game-panel sshd[23636]: Failed password for invalid user jcf from 51.77.200.101 port 46248 ssh2
Jun 30 21:52:06 game-panel sshd[24126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.200.101
2020-07-02 03:55:37
51.137.134.191 attackspam
Jul  1 00:04:04 meumeu sshd[183772]: Invalid user noc from 51.137.134.191 port 45942
Jul  1 00:04:04 meumeu sshd[183772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.137.134.191 
Jul  1 00:04:04 meumeu sshd[183772]: Invalid user noc from 51.137.134.191 port 45942
Jul  1 00:04:07 meumeu sshd[183772]: Failed password for invalid user noc from 51.137.134.191 port 45942 ssh2
Jul  1 00:07:22 meumeu sshd[183872]: Invalid user daniel from 51.137.134.191 port 44970
Jul  1 00:07:22 meumeu sshd[183872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.137.134.191 
Jul  1 00:07:22 meumeu sshd[183872]: Invalid user daniel from 51.137.134.191 port 44970
Jul  1 00:07:24 meumeu sshd[183872]: Failed password for invalid user daniel from 51.137.134.191 port 44970 ssh2
Jul  1 00:10:37 meumeu sshd[184059]: Invalid user zhaoxu from 51.137.134.191 port 43998
...
2020-07-02 04:22:18
104.192.82.99 attackbots
SSH Invalid Login
2020-07-02 03:45:35
51.124.49.66 attackspambots
Jun 30 21:09:58 prox sshd[22827]: Failed password for root from 51.124.49.66 port 43238 ssh2
2020-07-02 04:19:38
196.52.43.52 attack
firewall-block, port(s): 9002/tcp
2020-07-02 04:26:25
191.232.169.189 attackbots
SSH Brute-Force Attack
2020-07-02 04:09:17
197.242.147.68 attackbots
Jun 30 23:37:03 master sshd[3626]: Failed password for invalid user mysql from 197.242.147.68 port 40384 ssh2
2020-07-02 04:13:34
104.248.5.69 attack
Jun 30 18:47:24 NPSTNNYC01T sshd[27378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.5.69
Jun 30 18:47:25 NPSTNNYC01T sshd[27378]: Failed password for invalid user pablo from 104.248.5.69 port 58994 ssh2
Jun 30 18:50:28 NPSTNNYC01T sshd[27596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.5.69
...
2020-07-02 04:14:42

Recently Reported IPs

165.130.221.140 93.87.123.184 103.230.201.74 172.240.3.248
90.244.57.10 67.186.79.57 66.16.125.29 178.79.83.0
57.209.55.5 239.68.16.132 203.11.131.240 254.209.15.30
147.168.191.9 15.49.9.239 178.91.64.132 24.125.210.191
145.143.49.123 170.44.130.125 43.155.151.141 15.63.201.129