Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stockholm

Region: Stockholm County

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.14.7.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;23.14.7.80.			IN	A

;; AUTHORITY SECTION:
.			223	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012000 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 20 20:34:50 CST 2022
;; MSG SIZE  rcvd: 103
Host info
80.7.14.23.in-addr.arpa domain name pointer a23-14-7-80.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.7.14.23.in-addr.arpa	name = a23-14-7-80.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.155.9.86 attackspam
Time:     Thu Sep 10 10:01:09 2020 +0200
IP:       139.155.9.86 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 10 09:46:58 mail-03 sshd[5408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.9.86  user=root
Sep 10 09:47:00 mail-03 sshd[5408]: Failed password for root from 139.155.9.86 port 38500 ssh2
Sep 10 09:55:53 mail-03 sshd[5510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.9.86  user=root
Sep 10 09:55:55 mail-03 sshd[5510]: Failed password for root from 139.155.9.86 port 35750 ssh2
Sep 10 10:01:06 mail-03 sshd[5586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.9.86  user=root
2020-09-10 17:05:20
165.73.80.235 attack
Lines containing failures of 165.73.80.235 (max 1000)
Sep  7 10:04:49 ks3370873 sshd[158090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.73.80.235  user=r.r
Sep  7 10:04:51 ks3370873 sshd[158090]: Failed password for r.r from 165.73.80.235 port 38350 ssh2
Sep  7 10:04:52 ks3370873 sshd[158090]: Received disconnect from 165.73.80.235 port 38350:11: Bye Bye [preauth]
Sep  7 10:04:52 ks3370873 sshd[158090]: Disconnected from authenticating user r.r 165.73.80.235 port 38350 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=165.73.80.235
2020-09-10 16:49:20
79.184.214.78 attack
Wordpress attack
2020-09-10 16:52:32
117.242.147.93 attackspambots
Sep  9 18:42:56 xeon cyrus/imaps[34233]: badlogin: [117.242.147.93] plaintext szabo.abel@taylor.hu SASL(-13): authentication failure: checkpass failed
2020-09-10 17:17:17
222.186.180.17 attackspambots
Sep 10 04:43:58 plusreed sshd[28641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Sep 10 04:44:00 plusreed sshd[28641]: Failed password for root from 222.186.180.17 port 19698 ssh2
...
2020-09-10 16:44:11
5.189.136.58 attack
2020-09-09 23:14:54.020086-0500  localhost screensharingd[54424]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 5.189.136.58 :: Type: VNC DES
2020-09-10 17:13:59
128.199.190.186 attackspam
firewall-block, port(s): 1081/tcp
2020-09-10 17:07:25
80.82.78.100 attackbots
80.82.78.100 was recorded 5 times by 4 hosts attempting to connect to the following ports: 1541,1646,1088. Incident counter (4h, 24h, all-time): 5, 37, 29940
2020-09-10 16:55:49
111.229.58.152 attack
...
2020-09-10 17:19:59
218.104.198.139 attackbotsspam
" "
2020-09-10 17:23:09
178.128.99.141 attack
techno.ws 178.128.99.141 [10/Sep/2020:03:59:49 +0200] "POST /wp-login.php HTTP/1.1" 200 6134 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
techno.ws 178.128.99.141 [10/Sep/2020:03:59:49 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4037 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-10 16:51:13
137.74.119.50 attackbotsspam
...
2020-09-10 16:48:02
106.12.208.99 attackspambots
Sep  7 21:53:59 v26 sshd[27516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.99  user=r.r
Sep  7 21:54:01 v26 sshd[27516]: Failed password for r.r from 106.12.208.99 port 42106 ssh2
Sep  7 21:54:01 v26 sshd[27516]: Received disconnect from 106.12.208.99 port 42106:11: Bye Bye [preauth]
Sep  7 21:54:01 v26 sshd[27516]: Disconnected from 106.12.208.99 port 42106 [preauth]
Sep  7 22:11:10 v26 sshd[29162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.99  user=r.r
Sep  7 22:11:12 v26 sshd[29162]: Failed password for r.r from 106.12.208.99 port 45240 ssh2
Sep  7 22:11:12 v26 sshd[29162]: Received disconnect from 106.12.208.99 port 45240:11: Bye Bye [preauth]
Sep  7 22:11:12 v26 sshd[29162]: Disconnected from 106.12.208.99 port 45240 [preauth]
Sep  7 22:14:05 v26 sshd[29528]: Invalid user januario from 106.12.208.99 port 57512
Sep  7 22:14:05 v26 sshd[29528]: pam_unix(s........
-------------------------------
2020-09-10 17:24:17
14.207.43.165 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-10 17:18:54
164.52.24.22 attackbots
SSH-BruteForce
2020-09-10 16:45:10

Recently Reported IPs

64.14.15.228 80.229.97.58 134.1.35.187 210.203.90.235
46.46.198.190 168.48.80.64 214.58.17.200 68.49.249.4
7.7.75.96 52.114.75.38 220.64.106.18 44.98.186.11
71.211.231.19 176.111.150.26 176.30.73.25 5.45.32.29
10.71.243.198 81.103.144.33 52.42.21.35 112.20.160.4