Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Spring

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.22.80.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.22.80.136.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030200 1800 900 604800 86400

;; Query time: 459 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 02 19:33:01 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 136.80.22.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.80.22.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
150.95.129.150 attack
2019-06-27T10:21:01.725522abusebot-5.cloudsearch.cf sshd\[14615\]: Invalid user maven from 150.95.129.150 port 34280
2019-06-27 18:38:46
201.41.148.228 attackspambots
Jun 27 05:43:33 giegler sshd[13603]: Invalid user openfire from 201.41.148.228 port 54280
Jun 27 05:43:35 giegler sshd[13603]: Failed password for invalid user openfire from 201.41.148.228 port 54280 ssh2
Jun 27 05:43:33 giegler sshd[13603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.41.148.228
Jun 27 05:43:33 giegler sshd[13603]: Invalid user openfire from 201.41.148.228 port 54280
Jun 27 05:43:35 giegler sshd[13603]: Failed password for invalid user openfire from 201.41.148.228 port 54280 ssh2
2019-06-27 18:31:30
181.211.250.170 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 04:01:28,466 INFO [shellcode_manager] (181.211.250.170) no match, writing hexdump (e505b6c936aea43e9648b04e866dcc0c :2253471) - MS17010 (EternalBlue)
2019-06-27 18:32:09
178.32.136.127 attackspambots
C1,WP GET /suche/wp-login.php
2019-06-27 18:50:16
5.135.165.51 attackbotsspam
Jun 26 23:43:12 debian sshd\[26338\]: Invalid user cascades from 5.135.165.51 port 40606
Jun 26 23:43:12 debian sshd\[26338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.165.51
Jun 26 23:43:14 debian sshd\[26338\]: Failed password for invalid user cascades from 5.135.165.51 port 40606 ssh2
...
2019-06-27 18:36:53
114.108.175.184 attackspambots
Tried sshing with brute force.
2019-06-27 18:47:14
61.93.201.198 attack
2019-06-27T12:35:25.731441lon01.zurich-datacenter.net sshd\[8451\]: Invalid user mapred from 61.93.201.198 port 60811
2019-06-27T12:35:25.738831lon01.zurich-datacenter.net sshd\[8451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093201198.ctinets.com
2019-06-27T12:35:27.494819lon01.zurich-datacenter.net sshd\[8451\]: Failed password for invalid user mapred from 61.93.201.198 port 60811 ssh2
2019-06-27T12:38:16.799082lon01.zurich-datacenter.net sshd\[8496\]: Invalid user java from 61.93.201.198 port 46816
2019-06-27T12:38:16.805115lon01.zurich-datacenter.net sshd\[8496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093201198.ctinets.com
...
2019-06-27 18:45:02
88.247.37.78 attackspam
Telnet Server BruteForce Attack
2019-06-27 18:29:28
106.111.165.209 attackbotsspam
Jun 27 05:34:29 econome sshd[20843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.111.165.209  user=r.r
Jun 27 05:34:31 econome sshd[20843]: Failed password for r.r from 106.111.165.209 port 41618 ssh2
Jun 27 05:34:34 econome sshd[20843]: Failed password for r.r from 106.111.165.209 port 41618 ssh2
Jun 27 05:34:36 econome sshd[20843]: Failed password for r.r from 106.111.165.209 port 41618 ssh2
Jun 27 05:34:39 econome sshd[20843]: Failed password for r.r from 106.111.165.209 port 41618 ssh2
Jun 27 05:34:41 econome sshd[20843]: Failed password for r.r from 106.111.165.209 port 41618 ssh2
Jun 27 05:34:43 econome sshd[20843]: Failed password for r.r from 106.111.165.209 port 41618 ssh2
Jun 27 05:34:43 econome sshd[20843]: Disconnecting: Too many authentication failures for r.r from 106.111.165.209 port 41618 ssh2 [preauth]
Jun 27 05:34:43 econome sshd[20843]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ru........
-------------------------------
2019-06-27 18:34:07
62.244.20.146 attackspam
Jun 27 09:27:00 **** sshd[19920]: Invalid user test from 62.244.20.146 port 50647
2019-06-27 18:16:59
130.255.155.144 attackbots
Jun 27 06:33:59 bouncer sshd\[21856\]: Invalid user extension from 130.255.155.144 port 49074
Jun 27 06:33:59 bouncer sshd\[21856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.255.155.144 
Jun 27 06:34:00 bouncer sshd\[21856\]: Failed password for invalid user extension from 130.255.155.144 port 49074 ssh2
...
2019-06-27 18:39:13
207.154.215.236 attack
Jun 27 06:45:52 mail sshd\[25514\]: Invalid user user from 207.154.215.236 port 41628
Jun 27 06:45:52 mail sshd\[25514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.215.236
Jun 27 06:45:55 mail sshd\[25514\]: Failed password for invalid user user from 207.154.215.236 port 41628 ssh2
Jun 27 06:49:14 mail sshd\[26413\]: Invalid user space from 207.154.215.236 port 49702
Jun 27 06:49:14 mail sshd\[26413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.215.236
...
2019-06-27 18:46:56
49.249.243.235 attackbots
web-1 [ssh] SSH Attack
2019-06-27 18:05:28
178.60.39.61 attackbots
Jun 27 12:34:46 srv-4 sshd\[32508\]: Invalid user chuang from 178.60.39.61
Jun 27 12:34:46 srv-4 sshd\[32508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.60.39.61
Jun 27 12:34:47 srv-4 sshd\[32508\]: Failed password for invalid user chuang from 178.60.39.61 port 50951 ssh2
...
2019-06-27 18:11:09
71.189.47.10 attackbots
$f2bV_matches
2019-06-27 18:30:29

Recently Reported IPs

88.93.194.132 110.148.9.0 142.197.30.83 81.222.226.125
51.251.223.204 140.50.52.209 106.105.222.167 46.122.49.86
186.111.194.77 15.164.120.46 103.235.66.145 166.180.189.158
83.39.45.70 96.66.108.58 125.123.107.202 79.103.122.0
152.169.4.153 218.240.159.193 95.170.192.82 185.211.90.121