Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.80.22.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.80.22.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 20:46:26 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 105.22.80.169.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.22.80.169.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.124.168.100 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-12 03:06:21
39.66.128.26 attackbots
Unauthorised access (Apr 11) SRC=39.66.128.26 LEN=40 TTL=49 ID=15180 TCP DPT=8080 WINDOW=58766 SYN 
Unauthorised access (Apr 11) SRC=39.66.128.26 LEN=40 TTL=49 ID=29837 TCP DPT=8080 WINDOW=58766 SYN 
Unauthorised access (Apr 10) SRC=39.66.128.26 LEN=40 TTL=49 ID=123 TCP DPT=8080 WINDOW=58766 SYN 
Unauthorised access (Apr  9) SRC=39.66.128.26 LEN=40 TTL=49 ID=37742 TCP DPT=8080 WINDOW=58766 SYN 
Unauthorised access (Apr  9) SRC=39.66.128.26 LEN=40 TTL=49 ID=52320 TCP DPT=8080 WINDOW=58766 SYN 
Unauthorised access (Apr  8) SRC=39.66.128.26 LEN=40 TTL=49 ID=42439 TCP DPT=8080 WINDOW=35887 SYN 
Unauthorised access (Apr  7) SRC=39.66.128.26 LEN=40 TTL=49 ID=47340 TCP DPT=8080 WINDOW=23269 SYN 
Unauthorised access (Apr  6) SRC=39.66.128.26 LEN=40 TTL=49 ID=32178 TCP DPT=8080 WINDOW=23269 SYN 
Unauthorised access (Apr  5) SRC=39.66.128.26 LEN=40 TTL=49 ID=52920 TCP DPT=8080 WINDOW=35887 SYN
2020-04-12 02:47:34
62.234.146.45 attackspambots
Apr 11 18:25:21 host sshd[57662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.45  user=root
Apr 11 18:25:23 host sshd[57662]: Failed password for root from 62.234.146.45 port 41890 ssh2
...
2020-04-12 03:23:08
152.67.67.89 attackspambots
Apr 11 15:42:14 localhost sshd\[15321\]: Invalid user savelle from 152.67.67.89
Apr 11 15:42:14 localhost sshd\[15321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.67.89
Apr 11 15:42:17 localhost sshd\[15321\]: Failed password for invalid user savelle from 152.67.67.89 port 47724 ssh2
Apr 11 15:48:24 localhost sshd\[15619\]: Invalid user isaiah from 152.67.67.89
Apr 11 15:48:24 localhost sshd\[15619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.67.89
...
2020-04-12 03:20:09
176.40.105.245 attackbots
trying to access non-authorized port
2020-04-12 03:11:55
49.51.141.147 attackbots
5x Failed Password
2020-04-12 02:57:15
49.233.185.109 attackbots
$f2bV_matches
2020-04-12 03:01:58
106.13.230.250 attackbots
Apr 11 13:32:41 marvibiene sshd[4386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.230.250  user=root
Apr 11 13:32:43 marvibiene sshd[4386]: Failed password for root from 106.13.230.250 port 48446 ssh2
Apr 11 13:36:24 marvibiene sshd[4440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.230.250  user=root
Apr 11 13:36:26 marvibiene sshd[4440]: Failed password for root from 106.13.230.250 port 55244 ssh2
...
2020-04-12 03:18:31
106.12.178.245 attack
Apr 11 02:20:43 php1 sshd\[19176\]: Invalid user ftp_user from 106.12.178.245
Apr 11 02:20:43 php1 sshd\[19176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.245
Apr 11 02:20:45 php1 sshd\[19176\]: Failed password for invalid user ftp_user from 106.12.178.245 port 45074 ssh2
Apr 11 02:25:14 php1 sshd\[19615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.245  user=root
Apr 11 02:25:17 php1 sshd\[19615\]: Failed password for root from 106.12.178.245 port 42302 ssh2
2020-04-12 02:51:46
62.210.149.30 attackspam
[2020-04-11 14:43:33] NOTICE[12114][C-00004790] chan_sip.c: Call from '' (62.210.149.30:54330) to extension '0112297293740196' rejected because extension not found in context 'public'.
[2020-04-11 14:43:33] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-11T14:43:33.465-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0112297293740196",SessionID="0x7f020c088288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/54330",ACLName="no_extension_match"
[2020-04-11 14:44:28] NOTICE[12114][C-00004791] chan_sip.c: Call from '' (62.210.149.30:55757) to extension '0112397293740196' rejected because extension not found in context 'public'.
[2020-04-11 14:44:28] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-11T14:44:28.969-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0112397293740196",SessionID="0x7f020c088288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="I
...
2020-04-12 02:51:18
159.203.41.1 attack
159.203.41.1 - - [11/Apr/2020:14:13:32 +0200] "GET /wp-login.php HTTP/1.1" 200 6136 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.41.1 - - [11/Apr/2020:14:13:35 +0200] "POST /wp-login.php HTTP/1.1" 200 7014 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.41.1 - - [11/Apr/2020:14:13:37 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-12 03:15:21
187.140.209.64 attackbotsspam
Apr 10 04:36:52 olgosrv01 sshd[3450]: reveeclipse mapping checking getaddrinfo for dsl-187-140-209-64-dyn.prod-infinhostnameum.com.mx [187.140.209.64] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr 10 04:36:52 olgosrv01 sshd[3450]: Invalid user postgres from 187.140.209.64
Apr 10 04:36:52 olgosrv01 sshd[3450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.140.209.64 
Apr 10 04:36:54 olgosrv01 sshd[3450]: Failed password for invalid user postgres from 187.140.209.64 port 45176 ssh2
Apr 10 04:36:54 olgosrv01 sshd[3450]: Received disconnect from 187.140.209.64: 11: Bye Bye [preauth]
Apr 10 04:51:29 olgosrv01 sshd[4457]: reveeclipse mapping checking getaddrinfo for dsl-187-140-209-64-dyn.prod-infinhostnameum.com.mx [187.140.209.64] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr 10 04:51:29 olgosrv01 sshd[4457]: Invalid user jenkins from 187.140.209.64
Apr 10 04:51:29 olgosrv01 sshd[4457]: pam_unix(sshd:auth): authentication failure; logname= ........
-------------------------------
2020-04-12 03:05:40
123.206.38.253 attackbotsspam
Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-12 03:05:01
59.10.5.156 attack
SSH brute force attempt
2020-04-12 02:47:17
139.59.43.6 attack
Apr 11 14:13:41 debian64 sshd[421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.43.6 
Apr 11 14:13:42 debian64 sshd[421]: Failed password for invalid user villa from 139.59.43.6 port 39176 ssh2
...
2020-04-12 03:10:46

Recently Reported IPs

91.121.155.191 81.128.37.252 222.24.21.30 31.48.230.229
166.164.222.73 16.175.105.154 189.202.27.50 236.201.174.157
144.28.60.34 98.33.0.45 230.238.4.15 56.225.106.154
177.169.132.103 194.152.155.192 42.98.79.149 175.82.188.250
243.164.109.34 26.241.189.199 46.22.25.38 232.148.110.51