Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.80.5.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61809
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.80.5.54.			IN	A

;; AUTHORITY SECTION:
.			577	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102900 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 29 16:13:22 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 54.5.80.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.5.80.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.112.150.48 attackbotsspam
02/21/2020-22:29:13.230679 189.112.150.48 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-22 08:06:46
206.81.12.209 attackspambots
Feb 21 19:08:33 mail sshd\[12487\]: Invalid user taeyoung from 206.81.12.209
Feb 21 19:08:33 mail sshd\[12487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.12.209
...
2020-02-22 08:25:18
51.38.224.84 attackspambots
Feb 22 01:19:34 vpn01 sshd[5117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.224.84
Feb 22 01:19:36 vpn01 sshd[5117]: Failed password for invalid user jayendra from 51.38.224.84 port 38242 ssh2
...
2020-02-22 08:30:09
88.22.147.2 attackbots
Automatic report - Port Scan Attack
2020-02-22 08:27:42
23.94.17.122 attackbotsspam
Multiport scan : 32 ports scanned 2040 2066 2067 2074 2076 2105 2116 2131 2135 2179 2293 2391 2464 2509 2555 2652 2712 2729 2777 2790 2792 2807 2817 2836 2860 2917 2922 2926 2936 2945 2964 2974
2020-02-22 08:29:23
188.166.247.82 attackbotsspam
detected by Fail2Ban
2020-02-22 08:01:15
80.82.65.62 attack
02/22/2020-00:49:18.138467 80.82.65.62 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-22 08:04:07
37.114.140.213 attackspambots
Lines containing failures of 37.114.140.213
Feb 21 21:20:36 supported sshd[6793]: Invalid user admin from 37.114.140.213 port 51714
Feb 21 21:20:36 supported sshd[6793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.114.140.213 
Feb 21 21:20:38 supported sshd[6793]: Failed password for invalid user admin from 37.114.140.213 port 51714 ssh2
Feb 21 21:20:39 supported sshd[6793]: Connection closed by invalid user admin 37.114.140.213 port 51714 [preauth]
Feb 21 21:20:42 supported sshd[6804]: Invalid user admin from 37.114.140.213 port 51735
Feb 21 21:20:42 supported sshd[6804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.114.140.213 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.114.140.213
2020-02-22 08:18:46
206.189.128.215 attackspambots
Invalid user test from 206.189.128.215 port 58710
2020-02-22 08:11:34
109.201.207.88 attackspam
Feb 22 01:09:24 silence02 sshd[17852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.201.207.88
Feb 22 01:09:26 silence02 sshd[17852]: Failed password for invalid user plex from 109.201.207.88 port 43896 ssh2
Feb 22 01:13:56 silence02 sshd[18070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.201.207.88
2020-02-22 08:27:20
211.118.132.9 attackbots
scan z
2020-02-22 07:51:05
103.130.215.53 attackspam
Feb 21 22:24:19 vps58358 sshd\[25224\]: Invalid user pany from 103.130.215.53Feb 21 22:24:21 vps58358 sshd\[25224\]: Failed password for invalid user pany from 103.130.215.53 port 48438 ssh2Feb 21 22:26:44 vps58358 sshd\[25248\]: Invalid user git from 103.130.215.53Feb 21 22:26:47 vps58358 sshd\[25248\]: Failed password for invalid user git from 103.130.215.53 port 36950 ssh2Feb 21 22:28:59 vps58358 sshd\[25258\]: Invalid user penglina from 103.130.215.53Feb 21 22:29:01 vps58358 sshd\[25258\]: Failed password for invalid user penglina from 103.130.215.53 port 53696 ssh2
...
2020-02-22 08:13:49
34.84.232.216 attack
Feb 21 22:12:32 venus sshd[12595]: Invalid user sshuser from 34.84.232.216
Feb 21 22:12:32 venus sshd[12595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.84.232.216 
Feb 21 22:12:34 venus sshd[12595]: Failed password for invalid user sshuser from 34.84.232.216 port 37895 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=34.84.232.216
2020-02-22 08:30:25
218.92.0.191 attack
Feb 22 01:02:32 dcd-gentoo sshd[15801]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Feb 22 01:02:34 dcd-gentoo sshd[15801]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Feb 22 01:02:32 dcd-gentoo sshd[15801]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Feb 22 01:02:34 dcd-gentoo sshd[15801]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Feb 22 01:02:32 dcd-gentoo sshd[15801]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Feb 22 01:02:34 dcd-gentoo sshd[15801]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Feb 22 01:02:34 dcd-gentoo sshd[15801]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 55414 ssh2
...
2020-02-22 08:19:32
92.63.194.11 attackbotsspam
Feb 21 21:09:59 firewall sshd[18721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.11
Feb 21 21:09:59 firewall sshd[18721]: Invalid user guest from 92.63.194.11
Feb 21 21:10:01 firewall sshd[18721]: Failed password for invalid user guest from 92.63.194.11 port 39495 ssh2
...
2020-02-22 08:26:44

Recently Reported IPs

80.127.172.51 53.128.183.10 69.70.64.194 249.14.236.248
223.10.241.26 55.39.255.158 64.33.228.240 214.39.7.132
38.5.16.255 64.32.211.53 125.205.98.201 52.239.208.100
163.162.0.147 88.23.237.239 232.63.76.27 66.131.41.155
216.222.132.65 179.219.86.218 143.131.162.166 126.242.140.46