Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.145.3.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.145.3.80.			IN	A

;; AUTHORITY SECTION:
.			440	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010800 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 08 22:51:16 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 80.3.145.169.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.3.145.169.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.241.215.53 attackspam
Port probing on unauthorized port 2078
2020-06-28 14:07:47
129.211.107.82 attackspambots
20 attempts against mh-ssh on storm
2020-06-28 14:06:48
195.231.80.57 attackbots
(sshd) Failed SSH login from 195.231.80.57 (IT/Italy/host57-80-231-195.serverdedicati.aruba.it): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 28 10:55:06 serv sshd[5936]: Invalid user hub from 195.231.80.57 port 33798
Jun 28 10:55:08 serv sshd[5936]: Failed password for invalid user hub from 195.231.80.57 port 33798 ssh2
2020-06-28 13:51:21
212.102.33.47 attack
(From stubbs.alejandro@outlook.com) Hello,

I’m David Domine, owner of Louisville Historic Tours that operates here in Old Louisville, Kentucky.  
Like many businesses, I’m sure you and your employees have probably been stuck at home because of the Kentucky-wide lockdown. Most restaurants and bars still aren’t accepting large groups. This is making get-togethers or outside team building exercises currently impossible. 

That’s why I’m reaching out today.  I run a Daytime Walking Tour and a Nighttime Ghost Tour right here in Louisville.  Since our tours are outside, we are operating fully, and we are able to take groups of people (as long as we follow the social distancing guidelines.)

I’ve had a huge increase in the amount of organizations booking private tours for their employees since everyone is looking for a way to get together.  I wanted to reach out to you about the same possibility.    

Here’s the Daytime Walking Tour:

https://bit.ly/DaytimeWalkingTour

And here’s a bit of detail on the
2020-06-28 13:36:05
106.12.18.125 attackspambots
Jun 28 07:34:12 piServer sshd[28826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.18.125 
Jun 28 07:34:14 piServer sshd[28826]: Failed password for invalid user pages from 106.12.18.125 port 47884 ssh2
Jun 28 07:39:23 piServer sshd[29337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.18.125 
...
2020-06-28 14:00:38
114.67.110.227 attackspam
$f2bV_matches
2020-06-28 14:07:08
117.50.65.85 attackspam
Jun 27 21:07:00 dignus sshd[29801]: Failed password for invalid user jmiguel from 117.50.65.85 port 54320 ssh2
Jun 27 21:09:00 dignus sshd[29946]: Invalid user bsh from 117.50.65.85 port 55134
Jun 27 21:09:00 dignus sshd[29946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.65.85
Jun 27 21:09:03 dignus sshd[29946]: Failed password for invalid user bsh from 117.50.65.85 port 55134 ssh2
Jun 27 21:11:01 dignus sshd[30101]: Invalid user mantis from 117.50.65.85 port 55954
...
2020-06-28 14:09:40
106.13.42.52 attackspambots
$f2bV_matches
2020-06-28 13:52:36
115.84.76.234 attack
Dovecot Invalid User Login Attempt.
2020-06-28 13:46:26
116.196.73.159 attackspambots
" "
2020-06-28 13:55:21
52.188.114.3 attackspam
Invalid user vuser from 52.188.114.3 port 35636
2020-06-28 14:02:09
177.184.216.30 attackspambots
Invalid user fw from 177.184.216.30 port 33028
2020-06-28 13:45:24
198.71.238.4 attack
C2,WP GET /cms/wp-includes/wlwmanifest.xml
2020-06-28 14:17:59
107.173.176.209 attackspam
*Port Scan* detected from 107.173.176.209 (US/United States/New York/Albany/107-173-176-209-host.colocrossing.com). 4 hits in the last 140 seconds
2020-06-28 14:05:28
192.99.210.162 attackbots
Invalid user postgres from 192.99.210.162 port 38586
2020-06-28 13:58:38

Recently Reported IPs

172.85.84.161 123.28.16.215 84.206.0.171 91.221.40.143
193.65.81.18 234.149.63.30 113.176.6.153 230.11.32.52
173.74.120.74 253.23.63.215 42.138.17.164 170.232.227.112
121.208.14.73 230.2.123.55 174.27.160.14 46.184.112.172
90.165.132.185 180.244.224.220 205.217.189.251 55.239.29.43