Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yokohama

Region: Kanagawa

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.45.22.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.45.22.80.			IN	A

;; AUTHORITY SECTION:
.			549	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100101 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 02 05:39:24 CST 2023
;; MSG SIZE  rcvd: 105
Host info
80.22.45.218.in-addr.arpa domain name pointer 218-45-22-80.flets.kamome.or.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.22.45.218.in-addr.arpa	name = 218-45-22-80.flets.kamome.or.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.149.128.186 attack
Apr  2 22:41:46 OPSO sshd\[6533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.149.128.186  user=root
Apr  2 22:41:48 OPSO sshd\[6533\]: Failed password for root from 218.149.128.186 port 44115 ssh2
Apr  2 22:46:01 OPSO sshd\[7173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.149.128.186  user=root
Apr  2 22:46:02 OPSO sshd\[7173\]: Failed password for root from 218.149.128.186 port 49339 ssh2
Apr  2 22:50:10 OPSO sshd\[8169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.149.128.186  user=root
2020-04-03 05:28:11
51.38.80.173 attackbotsspam
SSH Brute-Force attacks
2020-04-03 05:31:34
120.35.26.129 attackbots
SSH Invalid Login
2020-04-03 05:51:31
222.186.173.238 attack
$f2bV_matches
2020-04-03 05:39:27
134.209.115.206 attack
Apr  2 23:49:49 eventyay sshd[15103]: Failed password for root from 134.209.115.206 port 57396 ssh2
Apr  2 23:53:12 eventyay sshd[15266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.115.206
Apr  2 23:53:15 eventyay sshd[15266]: Failed password for invalid user xiaoyun from 134.209.115.206 port 41028 ssh2
...
2020-04-03 06:01:06
132.232.248.82 attackbotsspam
Invalid user keila from 132.232.248.82 port 56858
2020-04-03 05:23:41
125.88.169.233 attack
Invalid user lakshmis from 125.88.169.233 port 37662
2020-04-03 05:28:58
104.248.205.67 attackspam
Dec 10 14:06:28 yesfletchmain sshd\[14438\]: Invalid user squid from 104.248.205.67 port 34066
Dec 10 14:06:28 yesfletchmain sshd\[14438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67
Dec 10 14:06:29 yesfletchmain sshd\[14438\]: Failed password for invalid user squid from 104.248.205.67 port 34066 ssh2
Dec 10 14:14:52 yesfletchmain sshd\[14817\]: Invalid user lyb from 104.248.205.67 port 54778
Dec 10 14:14:52 yesfletchmain sshd\[14817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67
...
2020-04-03 05:44:32
103.48.192.48 attack
Apr  2 15:17:26 s158375 sshd[790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.192.48
2020-04-03 05:33:55
125.227.79.91 attackspambots
trying to access non-authorized port
2020-04-03 05:40:46
47.89.18.71 attackspam
Apr  2 21:39:12 wordpress wordpress(www.ruhnke.cloud)[18032]: Blocked authentication attempt for admin from ::ffff:47.89.18.71
2020-04-03 05:52:18
46.101.112.205 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2020-04-03 06:01:20
194.127.176.202 attackbots
Apr  3 00:50:15 tuotantolaitos sshd[7032]: Failed password for root from 194.127.176.202 port 43626 ssh2
Apr  3 00:53:23 tuotantolaitos sshd[7091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.127.176.202
...
2020-04-03 05:55:05
61.177.172.128 attackbots
k+ssh-bruteforce
2020-04-03 05:25:24
31.209.62.168 attackspam
CMS (WordPress or Joomla) login attempt.
2020-04-03 05:36:21

Recently Reported IPs

85.32.17.32 248.159.55.246 149.12.105.238 128.157.159.22
29.71.24.105 2.161.170.83 170.64.112.173 127.0.0.242
190.168.86.201 12.8.171.44 58.224.43.52 251.125.35.151
155.162.37.187 200.67.67.196 3.47.23.129 75.21.169.32
178.121.117.140 50.234.130.87 23.7.173.54 155.6.11.39