Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.169.55.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9878
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.169.55.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 00:31:02 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 80.55.169.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.55.169.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.193.244.196 attackspambots
19/6/21@06:55:59: FAIL: Alarm-Intrusion address from=193.193.244.196
...
2019-06-22 01:40:12
183.129.48.189 attackbots
Jun 21 10:43:14 mxgate1 postfix/postscreen[27302]: CONNECT from [183.129.48.189]:52989 to [176.31.12.44]:25
Jun 21 10:43:14 mxgate1 postfix/dnsblog[27409]: addr 183.129.48.189 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 21 10:43:14 mxgate1 postfix/dnsblog[27413]: addr 183.129.48.189 listed by domain zen.spamhaus.org as 127.0.0.11
Jun 21 10:43:14 mxgate1 postfix/dnsblog[27413]: addr 183.129.48.189 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 21 10:43:14 mxgate1 postfix/dnsblog[27410]: addr 183.129.48.189 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jun 21 10:43:14 mxgate1 postfix/dnsblog[27412]: addr 183.129.48.189 listed by domain bl.spamcop.net as 127.0.0.2
Jun 21 10:43:20 mxgate1 postfix/postscreen[27302]: DNSBL rank 5 for [183.129.48.189]:52989
Jun x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=183.129.48.189
2019-06-22 00:56:30
223.197.216.112 attackbots
2019-06-21T09:41:13.872755abusebot-5.cloudsearch.cf sshd\[5274\]: Invalid user bot1 from 223.197.216.112 port 48974
2019-06-22 01:14:52
170.246.88.189 attack
Jun 21 10:56:12 mxgate1 postfix/postscreen[27302]: CONNECT from [170.246.88.189]:22699 to [176.31.12.44]:25
Jun 21 10:56:12 mxgate1 postfix/dnsblog[27409]: addr 170.246.88.189 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 21 10:56:12 mxgate1 postfix/dnsblog[27413]: addr 170.246.88.189 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 21 10:56:13 mxgate1 postfix/dnsblog[27412]: addr 170.246.88.189 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 21 10:56:18 mxgate1 postfix/postscreen[27302]: DNSBL rank 4 for [170.246.88.189]:22699
Jun x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=170.246.88.189
2019-06-22 01:44:36
5.62.19.45 attack
\[2019-06-21 13:05:43\] NOTICE\[2304\] chan_sip.c: Registration from '\' failed for '5.62.19.45:2711' - Wrong password
\[2019-06-21 13:05:43\] SECURITY\[2312\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-06-21T13:05:43.646-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="420",SessionID="0x7fea9c696c38",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.19.45/52789",Challenge="5c7fde46",ReceivedChallenge="5c7fde46",ReceivedHash="8c441e47aa85091ea06573b3587d1e73"
\[2019-06-21 13:07:15\] NOTICE\[2304\] chan_sip.c: Registration from '\' failed for '5.62.19.45:2796' - Wrong password
\[2019-06-21 13:07:15\] SECURITY\[2312\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-06-21T13:07:15.620-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="420",SessionID="0x7fea9c696c38",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.19.45/50187",Challe
2019-06-22 01:13:13
51.38.128.254 attackbots
2019-06-20T17:14:27.972555www.arvenenaske.de sshd[13987]: Invalid user sang from 51.38.128.254 port 44716
2019-06-20T17:14:28.115759www.arvenenaske.de sshd[13987]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.128.254 user=sang
2019-06-20T17:14:28.117530www.arvenenaske.de sshd[13987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.128.254
2019-06-20T17:14:27.972555www.arvenenaske.de sshd[13987]: Invalid user sang from 51.38.128.254 port 44716
2019-06-20T17:14:30.080828www.arvenenaske.de sshd[13987]: Failed password for invalid user sang from 51.38.128.254 port 44716 ssh2
2019-06-20T17:17:25.193473www.arvenenaske.de sshd[14025]: Invalid user jenkins from 51.38.128.254 port 46928
2019-06-20T17:17:25.203020www.arvenenaske.de sshd[14025]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.128.254 user=jenkins
2019-06-20T17:17:25.203908www.ar........
------------------------------
2019-06-22 00:39:21
46.101.105.47 attack
DATE:2019-06-21_19:12:29, IP:46.101.105.47, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-06-22 01:38:30
202.97.147.183 attackbots
Brute force attempt
2019-06-22 01:17:32
1.127.221.56 attackbots
SMTP_hacking
2019-06-22 01:35:54
179.171.44.47 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 00:58:52
163.172.63.156 attackspam
1561108150 - 06/21/2019 11:09:10 Host: 163-172-63-156.rev.poneytelecom.eu/163.172.63.156 Port: 389 UDP Blocked
2019-06-22 00:40:18
118.25.128.19 attack
SSH bruteforce (Triggered fail2ban)
2019-06-22 01:04:46
185.244.25.235 attackspambots
Jun 21 14:02:19 ns3367391 sshd\[17568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.25.235  user=root
Jun 21 14:02:20 ns3367391 sshd\[17568\]: Failed password for root from 185.244.25.235 port 57367 ssh2
...
2019-06-22 00:36:57
27.254.206.238 attackspam
2019-06-21T09:40:17.439483abusebot-7.cloudsearch.cf sshd\[29024\]: Invalid user duo from 27.254.206.238 port 43602
2019-06-22 00:38:37
123.21.18.128 attackbotsspam
Jun 21 10:51:21 server2101 sshd[2733]: Invalid user admin from 123.21.18.128
Jun 21 10:51:21 server2101 sshd[2733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.21.18.128
Jun 21 10:51:24 server2101 sshd[2733]: Failed password for invalid user admin from 123.21.18.128 port 52375 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.21.18.128
2019-06-22 01:15:42

Recently Reported IPs

41.95.208.231 82.193.123.207 109.104.73.96 122.179.207.21
64.62.197.1 84.15.14.65 99.127.202.36 116.249.241.103
16.74.238.51 254.46.31.187 113.174.122.148 242.45.14.116
119.24.102.61 134.155.158.204 220.36.159.37 121.59.214.28
206.76.218.183 195.92.247.10 219.16.17.142 204.47.124.227