Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Muramatsu

Region: Ibaraki

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.80.219.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.80.219.116.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 08:28:37 CST 2025
;; MSG SIZE  rcvd: 107
Host info
116.219.80.157.in-addr.arpa is an alias for 80.157.in-addr.arpa.
80.157.in-addr.arpa domain name pointer ibaraki.ac.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.219.80.157.in-addr.arpa	canonical name = 80.157.in-addr.arpa.
80.157.in-addr.arpa	name = ibaraki.ac.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.58.254 attackspambots
Aug 15 05:51:18 wbs sshd\[6889\]: Invalid user zzz from 139.59.58.254
Aug 15 05:51:18 wbs sshd\[6889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.254
Aug 15 05:51:20 wbs sshd\[6889\]: Failed password for invalid user zzz from 139.59.58.254 port 46928 ssh2
Aug 15 05:57:30 wbs sshd\[7456\]: Invalid user ryank from 139.59.58.254
Aug 15 05:57:30 wbs sshd\[7456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.254
2019-08-16 00:00:34
151.69.229.18 attackspam
Aug 15 17:54:48 dedicated sshd[18264]: Invalid user fachwirt from 151.69.229.18 port 33909
2019-08-16 00:17:42
51.15.233.178 attackspambots
Aug 15 16:02:04 pkdns2 sshd\[64748\]: Failed password for root from 51.15.233.178 port 34004 ssh2Aug 15 16:02:07 pkdns2 sshd\[64748\]: Failed password for root from 51.15.233.178 port 34004 ssh2Aug 15 16:02:09 pkdns2 sshd\[64748\]: Failed password for root from 51.15.233.178 port 34004 ssh2Aug 15 16:02:12 pkdns2 sshd\[64748\]: Failed password for root from 51.15.233.178 port 34004 ssh2Aug 15 16:02:13 pkdns2 sshd\[64748\]: Failed password for root from 51.15.233.178 port 34004 ssh2Aug 15 16:02:16 pkdns2 sshd\[64748\]: Failed password for root from 51.15.233.178 port 34004 ssh2
...
2019-08-16 00:02:30
103.38.215.57 attackbots
Aug 15 05:42:02 wbs sshd\[6031\]: Invalid user info from 103.38.215.57
Aug 15 05:42:02 wbs sshd\[6031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.215.57
Aug 15 05:42:03 wbs sshd\[6031\]: Failed password for invalid user info from 103.38.215.57 port 10591 ssh2
Aug 15 05:48:10 wbs sshd\[6618\]: Invalid user wp-user from 103.38.215.57
Aug 15 05:48:10 wbs sshd\[6618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.215.57
2019-08-15 23:57:02
84.94.236.118 attack
Automatic report - Port Scan Attack
2019-08-16 00:09:03
111.231.88.217 attackspam
Aug 15 05:41:46 hanapaa sshd\[23695\]: Invalid user anca from 111.231.88.217
Aug 15 05:41:46 hanapaa sshd\[23695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.88.217
Aug 15 05:41:48 hanapaa sshd\[23695\]: Failed password for invalid user anca from 111.231.88.217 port 43602 ssh2
Aug 15 05:48:31 hanapaa sshd\[24250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.88.217  user=root
Aug 15 05:48:33 hanapaa sshd\[24250\]: Failed password for root from 111.231.88.217 port 35004 ssh2
2019-08-16 00:17:08
167.71.162.252 attack
15.08.2019 11:23:22 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-08-16 00:12:19
177.73.70.218 attackspambots
2019-08-15T09:56:28.306998abusebot-6.cloudsearch.cf sshd\[29641\]: Invalid user 123456 from 177.73.70.218 port 19012
2019-08-16 00:37:44
13.235.43.238 attack
Aug 15 13:18:14 mail sshd\[32473\]: Failed password for invalid user ka from 13.235.43.238 port 44664 ssh2
Aug 15 13:35:58 mail sshd\[438\]: Invalid user testing from 13.235.43.238 port 37512
...
2019-08-16 00:55:43
218.78.50.252 attackbotsspam
SMTP:25. Blocked 5 login attempts in 8 days.
2019-08-15 23:57:41
197.45.155.12 attackspam
Aug 15 13:35:09 XXX sshd[53132]: Invalid user test from 197.45.155.12 port 63004
2019-08-16 00:40:44
115.146.126.209 attack
Aug 15 06:52:21 php1 sshd\[9296\]: Invalid user artur from 115.146.126.209
Aug 15 06:52:21 php1 sshd\[9296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.126.209
Aug 15 06:52:23 php1 sshd\[9296\]: Failed password for invalid user artur from 115.146.126.209 port 53160 ssh2
Aug 15 06:58:04 php1 sshd\[9829\]: Invalid user vika from 115.146.126.209
Aug 15 06:58:04 php1 sshd\[9829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.126.209
2019-08-16 00:58:07
67.71.60.56 attackbotsspam
Automatic report - Port Scan Attack
2019-08-16 00:52:46
121.65.173.82 attackbots
proto=tcp  .  spt=42903  .  dpt=25  .     (listed on     Github Combined on 4 lists )     (405)
2019-08-16 00:26:09
54.38.18.211 attack
Aug 15 07:28:12 plusreed sshd[4171]: Invalid user redbot from 54.38.18.211
...
2019-08-15 23:47:28

Recently Reported IPs

33.54.134.11 181.13.154.148 122.215.121.28 168.204.168.5
253.75.94.30 226.192.83.41 40.13.210.92 242.142.238.230
44.117.201.104 37.253.99.39 16.63.54.245 165.82.55.216
250.42.241.108 37.7.210.2 240.17.191.96 64.82.165.21
120.99.107.203 139.101.215.185 202.21.158.103 12.252.249.129