Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.53.82.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10202
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.53.82.80.			IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 03:06:10 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 80.82.53.16.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 16.53.82.80.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
31.9.180.151 attack
1577171575 - 12/24/2019 08:12:55 Host: 31.9.180.151/31.9.180.151 Port: 445 TCP Blocked
2019-12-24 22:35:02
134.175.54.130 attack
Dec 24 11:02:45 lnxweb61 sshd[26674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.54.130
2019-12-24 22:17:21
206.189.156.198 attack
Dec 24 13:27:52 lnxweb61 sshd[28559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.156.198
2019-12-24 22:05:17
197.253.254.18 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-12-24 21:58:26
110.34.177.2 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-24 21:59:01
148.235.57.179 attackbotsspam
Dec 24 09:42:20 vps691689 sshd[16030]: Failed password for root from 148.235.57.179 port 53842 ssh2
Dec 24 09:45:16 vps691689 sshd[16057]: Failed password for root from 148.235.57.179 port 50138 ssh2
...
2019-12-24 22:24:55
110.139.207.18 attackbotsspam
Invalid user peh from 110.139.207.18 port 34986
2019-12-24 22:06:17
46.105.29.160 attackspam
Dec 24 12:31:13 s1 sshd\[23441\]: Invalid user hershey from 46.105.29.160 port 35894
Dec 24 12:31:13 s1 sshd\[23441\]: Failed password for invalid user hershey from 46.105.29.160 port 35894 ssh2
Dec 24 12:33:06 s1 sshd\[23522\]: User sshd from 46.105.29.160 not allowed because not listed in AllowUsers
Dec 24 12:33:06 s1 sshd\[23522\]: Failed password for invalid user sshd from 46.105.29.160 port 54684 ssh2
Dec 24 12:35:01 s1 sshd\[23586\]: Invalid user operator from 46.105.29.160 port 45122
Dec 24 12:35:01 s1 sshd\[23586\]: Failed password for invalid user operator from 46.105.29.160 port 45122 ssh2
...
2019-12-24 22:31:21
106.13.125.159 attackspambots
Invalid user ptodd from 106.13.125.159 port 43912
2019-12-24 22:08:46
167.99.166.195 attackspambots
$f2bV_matches
2019-12-24 22:33:13
103.81.156.10 attack
SSH/22 MH Probe, BF, Hack -
2019-12-24 22:32:59
45.227.255.128 attackbots
2019-12-24T12:39:08.511082abusebot-5.cloudsearch.cf sshd[18531]: Invalid user admin from 45.227.255.128 port 16540
2019-12-24T12:39:08.537346abusebot-5.cloudsearch.cf sshd[18531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.255.128
2019-12-24T12:39:08.511082abusebot-5.cloudsearch.cf sshd[18531]: Invalid user admin from 45.227.255.128 port 16540
2019-12-24T12:39:11.071448abusebot-5.cloudsearch.cf sshd[18531]: Failed password for invalid user admin from 45.227.255.128 port 16540 ssh2
2019-12-24T12:39:11.203621abusebot-5.cloudsearch.cf sshd[18533]: Invalid user admin from 45.227.255.128 port 19760
2019-12-24T12:39:11.215144abusebot-5.cloudsearch.cf sshd[18533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.255.128
2019-12-24T12:39:11.203621abusebot-5.cloudsearch.cf sshd[18533]: Invalid user admin from 45.227.255.128 port 19760
2019-12-24T12:39:13.161978abusebot-5.cloudsearch.cf sshd[18533]:
...
2019-12-24 22:14:53
167.99.65.138 attack
Dec 24 14:59:03 cvbnet sshd[22126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.65.138 
Dec 24 14:59:05 cvbnet sshd[22126]: Failed password for invalid user maund from 167.99.65.138 port 60792 ssh2
...
2019-12-24 22:42:04
221.143.43.142 attack
Dec 24 13:20:44 server sshd\[13603\]: Invalid user canton from 221.143.43.142
Dec 24 13:20:44 server sshd\[13603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gw.atexmedical.com 
Dec 24 13:20:46 server sshd\[13603\]: Failed password for invalid user canton from 221.143.43.142 port 41572 ssh2
Dec 24 13:29:18 server sshd\[15519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gw.atexmedical.com  user=root
Dec 24 13:29:21 server sshd\[15519\]: Failed password for root from 221.143.43.142 port 50610 ssh2
...
2019-12-24 22:40:11
157.55.39.193 attack
Automatic report - Banned IP Access
2019-12-24 22:26:20

Recently Reported IPs

169.59.190.98 123.188.200.184 155.166.176.96 116.206.32.212
185.222.47.88 15.50.98.126 105.154.41.16 22.206.9.125
89.0.230.52 127.217.21.104 10.41.5.205 251.192.45.173
174.186.193.6 30.137.85.126 188.170.179.143 107.84.155.93
180.152.156.100 16.134.205.11 148.47.158.134 163.87.117.164