Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 22.80.185.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;22.80.185.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024123101 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 01 13:41:36 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 94.185.80.22.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.185.80.22.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.91.77.104 attack
(sshd) Failed SSH login from 51.91.77.104 (FR/France/104.ip-51-91-77.eu): 5 in the last 3600 secs
2020-06-03 16:39:40
164.138.23.149 attackbotsspam
(sshd) Failed SSH login from 164.138.23.149 (IR/Iran/-): 5 in the last 3600 secs
2020-06-03 16:49:16
218.88.235.36 attack
Jun  3 07:01:15 localhost sshd\[17078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.88.235.36  user=root
Jun  3 07:01:17 localhost sshd\[17078\]: Failed password for root from 218.88.235.36 port 21932 ssh2
Jun  3 07:05:34 localhost sshd\[17325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.88.235.36  user=root
Jun  3 07:05:36 localhost sshd\[17325\]: Failed password for root from 218.88.235.36 port 54332 ssh2
Jun  3 07:09:27 localhost sshd\[17469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.88.235.36  user=root
...
2020-06-03 16:37:13
159.65.97.7 attackbotsspam
 TCP (SYN) 159.65.97.7:58593 -> port 30511, len 44
2020-06-03 16:51:58
177.197.52.150 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-06-03 16:35:27
218.56.160.82 attack
Jun  3 08:21:40 prod4 sshd\[25678\]: Failed password for root from 218.56.160.82 port 40472 ssh2
Jun  3 08:27:56 prod4 sshd\[28087\]: Failed password for root from 218.56.160.82 port 43255 ssh2
Jun  3 08:30:11 prod4 sshd\[28999\]: Failed password for root from 218.56.160.82 port 22619 ssh2
...
2020-06-03 16:30:55
49.234.119.42 attack
$f2bV_matches
2020-06-03 16:34:47
172.93.4.78 attackbots
Fail2Ban Ban Triggered
2020-06-03 16:58:28
35.200.206.240 attackspambots
Jun  3 10:28:27 electroncash sshd[9176]: Failed password for root from 35.200.206.240 port 49022 ssh2
Jun  3 10:30:27 electroncash sshd[9675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.206.240  user=root
Jun  3 10:30:30 electroncash sshd[9675]: Failed password for root from 35.200.206.240 port 47552 ssh2
Jun  3 10:32:35 electroncash sshd[10219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.206.240  user=root
Jun  3 10:32:36 electroncash sshd[10219]: Failed password for root from 35.200.206.240 port 46084 ssh2
...
2020-06-03 16:40:55
93.39.104.224 attackbotsspam
IP blocked
2020-06-03 16:28:49
46.101.103.207 attackbots
(sshd) Failed SSH login from 46.101.103.207 (DE/Germany/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  3 08:53:56 ubnt-55d23 sshd[8462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.103.207  user=root
Jun  3 08:53:58 ubnt-55d23 sshd[8462]: Failed password for root from 46.101.103.207 port 46334 ssh2
2020-06-03 16:40:22
80.211.234.193 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-03T06:16:08Z and 2020-06-03T06:39:42Z
2020-06-03 16:22:31
45.237.83.131 attackbotsspam
20/6/2@23:52:03: FAIL: Alarm-Network address from=45.237.83.131
20/6/2@23:52:03: FAIL: Alarm-Network address from=45.237.83.131
...
2020-06-03 16:55:01
104.248.244.119 attackspambots
Jun  3 08:03:07 buvik sshd[1360]: Failed password for root from 104.248.244.119 port 40902 ssh2
Jun  3 08:06:43 buvik sshd[1845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.244.119  user=root
Jun  3 08:06:45 buvik sshd[1845]: Failed password for root from 104.248.244.119 port 46520 ssh2
...
2020-06-03 16:35:01
222.186.180.6 attack
Fail2Ban - SSH Bruteforce Attempt
2020-06-03 16:59:28

Recently Reported IPs

103.102.202.156 103.107.217.16 216.5.166.169 27.63.110.53
17.9.202.127 192.168.11.212 208.87.242.145 22.147.1.223
23.225.223.63 195.35.36.0 2804:18:18de:9cea:205e:8890:9de1:ca9b 152.255.198.199
133.8.175.255 205.43.158.138 201.1.224.2 26.95.84.32
2804:18:8ce:2d65:4da0:dee5:15f4:70c5 120.210.10.206 103.147.92.219 24.158.42.8