Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
160.20.147.134 attackspam
Repeated RDP login failures. Last user: marieclaude
2020-07-24 05:58:43
160.20.147.243 attack
Looking for resource vulnerabilities
2019-11-06 21:21:44
160.20.147.110 attack
SASL PLAIN auth failed: ruser=...
2019-09-11 13:42:53
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.20.147.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46956
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;160.20.147.80.			IN	A

;; AUTHORITY SECTION:
.			398	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011200 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 12 17:08:35 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 80.147.20.160.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.147.20.160.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.36.148.211 attackspam
suspicious action Tue, 10 Mar 2020 15:08:50 -0300
2020-03-11 09:42:01
51.158.127.70 attackspam
Mar 11 02:30:53 ns3042688 sshd\[9173\]: Invalid user ll from 51.158.127.70
Mar 11 02:30:53 ns3042688 sshd\[9173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.127.70 
Mar 11 02:30:55 ns3042688 sshd\[9173\]: Failed password for invalid user ll from 51.158.127.70 port 58836 ssh2
Mar 11 02:36:50 ns3042688 sshd\[10026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.127.70  user=root
Mar 11 02:36:52 ns3042688 sshd\[10026\]: Failed password for root from 51.158.127.70 port 45856 ssh2
...
2020-03-11 09:53:37
115.159.75.157 attackbots
Mar 10 22:44:43 xeon sshd[64985]: Failed password for root from 115.159.75.157 port 40848 ssh2
2020-03-11 09:29:07
190.206.111.11 attack
Unauthorized connection attempt detected from IP address 190.206.111.11 to port 445
2020-03-11 09:47:50
195.9.225.238 attack
SSH brute-force attempt
2020-03-11 09:21:55
62.210.85.64 attack
TCP port 3389: Scan and connection
2020-03-11 09:19:27
157.245.109.223 attackspambots
FTP Brute-Force reported by Fail2Ban
2020-03-11 09:34:20
143.208.135.240 attackspambots
Mar 10 19:08:46 lnxded64 sshd[30382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.208.135.240
2020-03-11 09:45:01
87.78.222.35 attack
suspicious action Tue, 10 Mar 2020 15:08:46 -0300
2020-03-11 09:45:51
51.38.235.100 attackbotsspam
Mar 10 14:59:52 askasleikir sshd[167678]: Failed password for root from 51.38.235.100 port 44102 ssh2
2020-03-11 09:39:39
206.189.181.12 attackspambots
Mar 11 00:14:07 debian-2gb-nbg1-2 kernel: \[6141192.319199\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=206.189.181.12 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=14721 PROTO=TCP SPT=34377 DPT=23 WINDOW=37977 RES=0x00 SYN URGP=0
2020-03-11 09:47:23
80.82.70.118 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 27017 proto: TCP cat: Misc Attack
2020-03-11 09:17:12
45.125.65.35 attack
Mar 11 02:34:24 relay postfix/smtpd\[14278\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 11 02:41:12 relay postfix/smtpd\[15451\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 11 02:45:01 relay postfix/smtpd\[17179\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 11 02:48:00 relay postfix/smtpd\[18955\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 11 02:50:16 relay postfix/smtpd\[7059\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-11 09:51:40
187.45.103.117 attackspam
Unauthorized connection attempt detected from IP address 187.45.103.117 to port 23
2020-03-11 09:52:40
49.232.146.216 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-03-11 09:50:14

Recently Reported IPs

1.189.220.189 3.89.113.54 110.49.17.95 159.89.190.128
200.52.203.10 159.65.28.184 220.134.129.27 5.75.156.37
20.29.69.183 35.221.104.58 176.31.154.12 202.57.17.34
195.8.249.243 217.64.14.162 160.202.145.161 124.129.198.194
157.254.193.139 122.160.65.215 209.141.48.216 114.216.218.43