Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.89.80.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40136
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.89.80.11.			IN	A

;; AUTHORITY SECTION:
.			301	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091400 1800 900 604800 86400

;; Query time: 177 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 14 19:40:22 CST 2022
;; MSG SIZE  rcvd: 105
Host info
11.80.89.207.in-addr.arpa domain name pointer cf59500b.dynamic.tele-ag.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.80.89.207.in-addr.arpa	name = cf59500b.dynamic.tele-ag.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.246.76.253 attack
Port scan: Attack repeated for 24 hours
2020-02-03 10:07:48
89.46.239.240 attack
Unauthorized connection attempt detected from IP address 89.46.239.240 to port 23 [J]
2020-02-03 09:51:04
120.70.103.239 attackbotsspam
Jan 27 20:44:27 ahost sshd[11017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.103.239  user=r.r
Jan 27 20:44:29 ahost sshd[11017]: Failed password for r.r from 120.70.103.239 port 50482 ssh2
Jan 27 20:44:29 ahost sshd[11017]: Received disconnect from 120.70.103.239: 11: Bye Bye [preauth]
Jan 27 21:01:38 ahost sshd[19871]: Invalid user compta from 120.70.103.239
Jan 27 21:01:38 ahost sshd[19871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.103.239 
Jan 27 21:01:40 ahost sshd[19871]: Failed password for invalid user compta from 120.70.103.239 port 38565 ssh2
Jan 27 21:01:40 ahost sshd[19871]: Received disconnect from 120.70.103.239: 11: Bye Bye [preauth]
Jan 27 21:05:22 ahost sshd[20110]: Invalid user allison from 120.70.103.239
Jan 27 21:05:22 ahost sshd[20110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.103.239 
Jan 27........
------------------------------
2020-02-03 09:31:06
106.13.177.138 attackbots
$f2bV_matches
2020-02-03 09:35:18
138.0.60.5 attack
Feb  2 15:36:01 hpm sshd\[7649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.0.60.5.wellnet.com.br  user=root
Feb  2 15:36:03 hpm sshd\[7649\]: Failed password for root from 138.0.60.5 port 35040 ssh2
Feb  2 15:41:23 hpm sshd\[8018\]: Invalid user archie from 138.0.60.5
Feb  2 15:41:23 hpm sshd\[8018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.0.60.5.wellnet.com.br
Feb  2 15:41:25 hpm sshd\[8018\]: Failed password for invalid user archie from 138.0.60.5 port 36646 ssh2
2020-02-03 10:04:34
190.145.7.42 attackspam
Unauthorized connection attempt detected from IP address 190.145.7.42 to port 2220 [J]
2020-02-03 09:29:46
222.80.125.103 attack
Unauthorized connection attempt detected from IP address 222.80.125.103 to port 3389 [T]
2020-02-03 10:04:56
106.12.156.236 attackspam
Feb  3 02:21:33 silence02 sshd[8067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.156.236
Feb  3 02:21:35 silence02 sshd[8067]: Failed password for invalid user rutan from 106.12.156.236 port 37336 ssh2
Feb  3 02:24:50 silence02 sshd[8373]: Failed password for root from 106.12.156.236 port 33790 ssh2
2020-02-03 09:41:07
67.207.88.180 attackspam
Feb  2 15:57:54 hpm sshd\[8956\]: Invalid user aspasov from 67.207.88.180
Feb  2 15:57:54 hpm sshd\[8956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.88.180
Feb  2 15:57:56 hpm sshd\[8956\]: Failed password for invalid user aspasov from 67.207.88.180 port 47096 ssh2
Feb  2 16:01:05 hpm sshd\[9106\]: Invalid user gsk from 67.207.88.180
Feb  2 16:01:05 hpm sshd\[9106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.88.180
2020-02-03 10:03:00
222.186.180.142 attack
(sshd) Failed SSH login from 222.186.180.142 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb  3 01:58:53 elude sshd[11654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
Feb  3 01:58:55 elude sshd[11654]: Failed password for root from 222.186.180.142 port 47983 ssh2
Feb  3 02:23:54 elude sshd[13009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
Feb  3 02:23:56 elude sshd[13009]: Failed password for root from 222.186.180.142 port 51677 ssh2
Feb  3 02:37:56 elude sshd[13876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
2020-02-03 09:50:34
35.245.57.202 attack
Unauthorized connection attempt detected from IP address 35.245.57.202 to port 2220 [J]
2020-02-03 09:58:31
106.12.95.20 attackspam
Feb  2 23:55:24 srv01 sshd[9403]: Invalid user system from 106.12.95.20 port 35124
Feb  2 23:55:24 srv01 sshd[9403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.95.20
Feb  2 23:55:24 srv01 sshd[9403]: Invalid user system from 106.12.95.20 port 35124
Feb  2 23:55:27 srv01 sshd[9403]: Failed password for invalid user system from 106.12.95.20 port 35124 ssh2
Feb  3 00:04:24 srv01 sshd[10091]: Invalid user sudyka from 106.12.95.20 port 48486


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.12.95.20
2020-02-03 09:24:13
49.88.112.55 attackbots
Feb  3 06:44:43 areeb-Workstation sshd[31751]: Failed password for root from 49.88.112.55 port 13794 ssh2
Feb  3 06:44:48 areeb-Workstation sshd[31751]: Failed password for root from 49.88.112.55 port 13794 ssh2
...
2020-02-03 09:24:41
185.156.73.52 attack
02/02/2020-21:04:26.416182 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-03 10:10:21
24.143.136.16 attack
firewall-block, port(s): 5555/tcp
2020-02-03 10:00:22

Recently Reported IPs

201.75.89.88 218.146.163.192 96.126.122.198 85.25.217.236
154.201.33.66 95.71.83.58 23.94.84.98 164.155.122.105
173.20.167.135 5.252.179.103 172.245.171.73 180.183.68.182
64.207.184.28 60.174.191.25 77.119.217.188 112.120.140.210
117.28.167.154 201.254.142.116 1.212.43.172 179.218.213.19