Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: RTC Communications LLC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.80.144.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.80.144.165.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 13:50:13 CST 2025
;; MSG SIZE  rcvd: 107
Host info
165.144.80.216.in-addr.arpa domain name pointer h165.144.80.216.static.ip.windstream.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
165.144.80.216.in-addr.arpa	name = h165.144.80.216.static.ip.windstream.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.139.197.234 attackspam
suspicious action Fri, 28 Feb 2020 10:29:36 -0300
2020-02-29 02:13:20
189.239.95.126 attackspambots
Feb 28 19:05:09 vps647732 sshd[26959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.239.95.126
Feb 28 19:05:11 vps647732 sshd[26959]: Failed password for invalid user telnet from 189.239.95.126 port 47912 ssh2
...
2020-02-29 02:12:28
144.48.82.106 attackspambots
IP: 144.48.82.106
Ports affected
    Simple Mail Transfer (25) 
Found in DNSBL('s)
ASN Details
   AS33387 NOCIX
   Myanmar (MM)
   CIDR 144.48.82.0/24
Log Date: 28/02/2020 4:33:56 PM UTC
2020-02-29 01:50:17
178.134.24.150 attack
Unauthorized connection attempt from IP address 178.134.24.150 on Port 445(SMB)
2020-02-29 01:42:43
124.248.180.79 attack
suspicious action Fri, 28 Feb 2020 10:29:29 -0300
2020-02-29 02:16:13
47.104.191.157 attack
firewall-block, port(s): 1433/tcp
2020-02-29 01:54:13
42.114.209.136 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 02:15:17
218.92.0.148 attackspam
IP blocked
2020-02-29 02:05:12
42.114.209.137 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 02:14:20
189.8.3.10 attackbots
DATE:2020-02-28 14:27:26, IP:189.8.3.10, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-29 02:04:12
45.143.220.215 attackbots
15:38:46	N. regola NAT1	UDP	 	
45.143.220.215	:	48039
→	
10.10.1.20	:	5060
 	
len=480	ttl=51	tos=0x00	srcmac=40:9b:cd:98:e3:30	dstmac=00:0c:29:66:86:ea
15:39:43	N. regola NAT1	UDP	 	
45.143.220.215	:	34658
→	
10.10.1.20	:	5060
 	
len=485	ttl=51	tos=0x00	srcmac=40:9b:cd:98:e3:30	dstmac=00:0c:29:66:86:ea
2020-02-29 02:01:12
201.242.216.164 attackbotsspam
Invalid user test from 201.242.216.164 port 45382
2020-02-29 01:38:11
42.114.81.60 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 02:07:41
160.153.234.236 attack
Feb 28 18:35:54 ns381471 sshd[17034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.153.234.236
Feb 28 18:35:56 ns381471 sshd[17034]: Failed password for invalid user kimi from 160.153.234.236 port 56428 ssh2
2020-02-29 02:06:05
93.37.83.11 attackbotsspam
Spammer
2020-02-29 01:47:54

Recently Reported IPs

205.228.193.162 254.235.14.162 108.213.185.205 18.87.58.45
128.105.27.67 139.252.198.196 78.255.92.6 103.61.101.11
176.198.108.169 228.34.180.92 199.108.160.189 186.47.65.118
187.8.220.102 96.208.58.203 5.204.213.215 29.24.74.20
215.230.144.199 129.141.33.36 247.170.60.134 50.105.225.127