Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.133.5.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17388
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.133.5.80.			IN	A

;; AUTHORITY SECTION:
.			223	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032300 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 23 15:25:57 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 80.5.133.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.5.133.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.183 attackbotsspam
Jul 23 17:46:55 ny01 sshd[10842]: Failed password for root from 222.186.173.183 port 4146 ssh2
Jul 23 17:47:06 ny01 sshd[10842]: Failed password for root from 222.186.173.183 port 4146 ssh2
Jul 23 17:47:08 ny01 sshd[10842]: Failed password for root from 222.186.173.183 port 4146 ssh2
Jul 23 17:47:08 ny01 sshd[10842]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 4146 ssh2 [preauth]
2020-07-24 05:52:14
81.147.115.159 attack
Jul 23 16:19:38 NPSTNNYC01T sshd[13685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.147.115.159
Jul 23 16:19:38 NPSTNNYC01T sshd[13689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.147.115.159
Jul 23 16:19:40 NPSTNNYC01T sshd[13685]: Failed password for invalid user pi from 81.147.115.159 port 37014 ssh2
Jul 23 16:19:40 NPSTNNYC01T sshd[13689]: Failed password for invalid user pi from 81.147.115.159 port 37024 ssh2
...
2020-07-24 05:54:25
106.12.108.170 attackspambots
Jul 23 23:28:00 piServer sshd[31440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.170 
Jul 23 23:28:02 piServer sshd[31440]: Failed password for invalid user testuser from 106.12.108.170 port 39524 ssh2
Jul 23 23:32:24 piServer sshd[31908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.170 
...
2020-07-24 05:41:17
104.200.134.181 attack
Port 22 Scan, PTR: None
2020-07-24 06:07:38
164.52.106.199 attackbots
Jun 13 07:21:27 pi sshd[5897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.52.106.199 
Jun 13 07:21:28 pi sshd[5897]: Failed password for invalid user gengjiao from 164.52.106.199 port 38634 ssh2
2020-07-24 05:50:35
151.253.125.137 attackbotsspam
Jul 23 18:00:47 NPSTNNYC01T sshd[21328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.253.125.137
Jul 23 18:00:49 NPSTNNYC01T sshd[21328]: Failed password for invalid user user2 from 151.253.125.137 port 58350 ssh2
Jul 23 18:05:09 NPSTNNYC01T sshd[21678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.253.125.137
...
2020-07-24 06:08:43
183.111.206.111 attackbotsspam
Invalid user wilson from 183.111.206.111 port 47089
2020-07-24 06:13:09
164.132.47.159 attack
Jun 27 05:24:11 pi sshd[7521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.47.159 
Jun 27 05:24:14 pi sshd[7521]: Failed password for invalid user administrator from 164.132.47.159 port 41716 ssh2
2020-07-24 06:13:55
61.177.172.54 attackspam
Jul 23 23:39:52 vm0 sshd[16030]: Failed password for root from 61.177.172.54 port 8763 ssh2
Jul 23 23:40:04 vm0 sshd[16030]: error: maximum authentication attempts exceeded for root from 61.177.172.54 port 8763 ssh2 [preauth]
...
2020-07-24 05:43:25
164.132.98.75 attackbots
SSH Invalid Login
2020-07-24 06:06:55
106.54.2.175 attackspam
Port Scan
...
2020-07-24 05:51:35
212.70.149.51 attackspam
2020-07-23 23:41:04 dovecot_login authenticator failed for \(User\) \[212.70.149.51\]: 535 Incorrect authentication data \(set_id=traffic@no-server.de\)
2020-07-23 23:41:06 dovecot_login authenticator failed for \(User\) \[212.70.149.51\]: 535 Incorrect authentication data \(set_id=traffic@no-server.de\)
2020-07-23 23:41:24 dovecot_login authenticator failed for \(User\) \[212.70.149.51\]: 535 Incorrect authentication data \(set_id=token@no-server.de\)
2020-07-23 23:41:24 dovecot_login authenticator failed for \(User\) \[212.70.149.51\]: 535 Incorrect authentication data \(set_id=token@no-server.de\)
2020-07-23 23:41:32 dovecot_login authenticator failed for \(User\) \[212.70.149.51\]: 535 Incorrect authentication data \(set_id=token@no-server.de\)
2020-07-23 23:41:34 dovecot_login authenticator failed for \(User\) \[212.70.149.51\]: 535 Incorrect authentication data \(set_id=token@no-server.de\)
2020-07-23 23:41:52 dovecot_login authenticator failed for \(User\) \[212.70.149.51\]: 535
...
2020-07-24 05:44:35
156.96.119.148 attackbots
[2020-07-23 17:37:10] NOTICE[1277][C-000024da] chan_sip.c: Call from '' (156.96.119.148:59436) to extension '26000441252954108' rejected because extension not found in context 'public'.
[2020-07-23 17:37:10] SECURITY[1295] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-23T17:37:10.396-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="26000441252954108",SessionID="0x7f17542ea028",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.119.148/59436",ACLName="no_extension_match"
[2020-07-23 17:39:09] NOTICE[1277][C-000024dc] chan_sip.c: Call from '' (156.96.119.148:51532) to extension '26100441252954108' rejected because extension not found in context 'public'.
[2020-07-23 17:39:09] SECURITY[1295] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-23T17:39:09.570-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="26100441252954108",SessionID="0x7f1754714b08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress
...
2020-07-24 05:59:07
164.52.12.210 attackbots
May  6 13:47:15 pi sshd[20131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.52.12.210 
May  6 13:47:17 pi sshd[20131]: Failed password for invalid user admin from 164.52.12.210 port 57949 ssh2
2020-07-24 05:49:02
119.45.156.35 attack
Repeated RDP login failures. Last user: User1
2020-07-24 06:00:37

Recently Reported IPs

250.7.146.209 79.222.31.7 118.109.158.243 253.43.216.74
195.96.57.126 237.160.148.12 198.54.144.138 7.168.89.34
140.89.153.208 191.193.159.217 162.105.255.169 119.66.200.203
254.102.40.215 71.9.138.5 129.200.238.104 226.204.59.249
142.3.64.65 197.164.229.232 187.242.105.54 242.91.186.155