Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Clayton

Region: Missouri

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.80.161.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48707
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;4.80.161.99.			IN	A

;; AUTHORITY SECTION:
.			406	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040100 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 21:46:47 CST 2020
;; MSG SIZE  rcvd: 115
Host info
99.161.80.4.in-addr.arpa domain name pointer dialup-4.80.161.99.Dial1.StLouis1.Level3.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.161.80.4.in-addr.arpa	name = dialup-4.80.161.99.Dial1.StLouis1.Level3.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
74.63.190.82 attack
Jan  3 07:14:54 dedicated sshd[15439]: Invalid user franklin from 74.63.190.82 port 39630
2020-01-03 14:44:25
46.101.81.143 attackbotsspam
Brute-force attempt banned
2020-01-03 15:07:02
87.103.120.250 attack
$f2bV_matches
2020-01-03 15:16:14
46.101.44.220 attackbotsspam
Jan  3 02:50:13 ws12vmsma01 sshd[53929]: Invalid user gr from 46.101.44.220
Jan  3 02:50:15 ws12vmsma01 sshd[53929]: Failed password for invalid user gr from 46.101.44.220 port 38588 ssh2
Jan  3 02:51:49 ws12vmsma01 sshd[54170]: Invalid user minecraft from 46.101.44.220
...
2020-01-03 14:43:18
51.68.227.49 attack
Jan  3 06:15:03 dedicated sshd[3922]: Invalid user test5 from 51.68.227.49 port 56898
2020-01-03 14:26:50
185.175.93.14 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 34343 proto: TCP cat: Misc Attack
2020-01-03 14:53:40
14.171.196.40 attack
Attempts against SMTP/SSMTP
2020-01-03 15:08:40
138.197.202.197 attackbotsspam
Unauthorized connection attempt detected from IP address 138.197.202.197 to port 80
2020-01-03 14:45:13
43.255.140.218 attack
Automatic report - Banned IP Access
2020-01-03 14:54:34
117.5.220.111 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-01-03 14:57:19
180.76.102.226 attackbots
Jan  3 07:34:43 server sshd\[3405\]: Invalid user hrg from 180.76.102.226
Jan  3 07:34:43 server sshd\[3405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.102.226 
Jan  3 07:34:45 server sshd\[3405\]: Failed password for invalid user hrg from 180.76.102.226 port 33050 ssh2
Jan  3 07:51:24 server sshd\[7544\]: Invalid user qaf from 180.76.102.226
Jan  3 07:51:24 server sshd\[7544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.102.226 
...
2020-01-03 15:13:06
180.100.214.87 attack
Invalid user test from 180.100.214.87 port 40706
2020-01-03 14:57:31
218.92.0.184 attackbotsspam
v+ssh-bruteforce
2020-01-03 15:12:18
165.22.213.24 attackspambots
Jan  3 07:23:51 [host] sshd[19881]: Invalid user user from 165.22.213.24
Jan  3 07:23:51 [host] sshd[19881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.213.24
Jan  3 07:23:54 [host] sshd[19881]: Failed password for invalid user user from 165.22.213.24 port 59346 ssh2
2020-01-03 14:29:28
213.166.70.101 attackbotsspam
Port scan on 3 port(s): 220 389 542
2020-01-03 15:04:27

Recently Reported IPs

182.226.228.82 145.194.201.48 95.156.101.74 180.251.157.214
171.0.155.168 14.185.51.224 52.15.90.56 53.196.118.30
14.166.186.167 123.26.60.227 46.162.251.178 103.45.190.53
8.72.92.189 94.131.241.23 4.20.136.163 94.130.50.80
61.111.25.21 42.2.198.23 179.107.143.89 165.254.114.140