Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Washington

Region: District of Columbia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.80.34.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21970
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.80.34.136.			IN	A

;; AUTHORITY SECTION:
.			393	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060900 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 09 23:25:50 CST 2024
;; MSG SIZE  rcvd: 106
Host info
136.34.80.161.in-addr.arpa is an alias for 255.255.80.161.in-addr.arpa.
255.255.80.161.in-addr.arpa domain name pointer unassigned.epa.gov.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.34.80.161.in-addr.arpa	canonical name = 255.255.80.161.in-addr.arpa.
255.255.80.161.in-addr.arpa	name = unassigned.epa.gov.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.236.38.105 attackbotsspam
Invalid user rizon from 104.236.38.105 port 34196
2020-03-12 20:59:36
106.13.103.128 attackbots
Mar 12 13:31:38 lnxmail61 sshd[24008]: Failed password for root from 106.13.103.128 port 56360 ssh2
Mar 12 13:31:38 lnxmail61 sshd[24008]: Failed password for root from 106.13.103.128 port 56360 ssh2
2020-03-12 21:32:17
123.49.4.36 attackbots
Unauthorized connection attempt from IP address 123.49.4.36 on Port 445(SMB)
2020-03-12 21:02:18
103.104.162.122 attackspam
Unauthorized connection attempt from IP address 103.104.162.122 on Port 445(SMB)
2020-03-12 20:53:06
104.81.169.99 attackspam
[portscan] Port scan
2020-03-12 21:30:38
179.43.97.170 attackspambots
23/tcp
[2020-03-12]1pkt
2020-03-12 21:26:10
222.254.75.184 attack
1584016323 - 03/12/2020 13:32:03 Host: 222.254.75.184/222.254.75.184 Port: 445 TCP Blocked
2020-03-12 20:52:15
103.250.166.12 attackbots
Registration form abuse
2020-03-12 21:35:09
222.136.154.99 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-12 21:32:41
118.201.195.226 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-12 21:07:22
222.186.175.217 attackbots
[ssh] SSH attack
2020-03-12 21:17:50
218.92.0.202 attackspam
Mar 12 13:31:38 santamaria sshd\[17383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
Mar 12 13:31:40 santamaria sshd\[17383\]: Failed password for root from 218.92.0.202 port 44886 ssh2
Mar 12 13:31:44 santamaria sshd\[17383\]: Failed password for root from 218.92.0.202 port 44886 ssh2
...
2020-03-12 21:15:14
139.59.169.37 attackbotsspam
SSH Brute-Force attacks
2020-03-12 20:50:36
78.85.36.59 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-12 20:51:51
109.244.96.201 attackbotsspam
suspicious action Thu, 12 Mar 2020 09:31:36 -0300
2020-03-12 21:34:39

Recently Reported IPs

64.60.32.190 28.156.68.158 108.139.39.175 74.111.170.61
248.217.230.86 58.244.16.57 173.133.203.97 221.166.17.222
125.30.142.28 227.71.81.243 2.202.14.21 33.38.243.16
111.48.205.254 27.227.81.228 2.93.42.109 208.246.142.136
239.10.189.185 163.70.191.131 103.110.81.191 58.135.184.253