Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.80.130.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42072
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.80.130.91.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 13:54:07 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 91.130.80.47.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 91.130.80.47.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.0.59.223 attack
Automatic report - Port Scan Attack
2020-04-27 06:51:07
106.12.171.124 attackbots
SSH Brute-Force. Ports scanning.
2020-04-27 07:01:48
148.70.128.197 attackspambots
Apr 26 23:01:17 meumeu sshd[5032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.128.197 
Apr 26 23:01:19 meumeu sshd[5032]: Failed password for invalid user tee from 148.70.128.197 port 43938 ssh2
Apr 26 23:02:48 meumeu sshd[5228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.128.197 
...
2020-04-27 06:45:43
42.176.57.166 attackbotsspam
trying to access non-authorized port
2020-04-27 06:38:35
106.13.165.247 attack
Apr 27 00:40:38 MainVPS sshd[14601]: Invalid user broker from 106.13.165.247 port 38134
Apr 27 00:40:38 MainVPS sshd[14601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.165.247
Apr 27 00:40:38 MainVPS sshd[14601]: Invalid user broker from 106.13.165.247 port 38134
Apr 27 00:40:40 MainVPS sshd[14601]: Failed password for invalid user broker from 106.13.165.247 port 38134 ssh2
Apr 27 00:44:07 MainVPS sshd[17605]: Invalid user 1234 from 106.13.165.247 port 46870
...
2020-04-27 06:47:46
195.181.168.138 attack
[2020-04-26 18:52:23] NOTICE[1170] chan_sip.c: Registration from '' failed for '195.181.168.138:52134' - Wrong password
[2020-04-26 18:52:23] SECURITY[1184] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-04-26T18:52:23.150-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="74",SessionID="0x7f6c0825a1d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.181.168.138/52134",Challenge="62cefef2",ReceivedChallenge="62cefef2",ReceivedHash="cc26bc589129f36ead208af38440a78e"
[2020-04-26 18:52:37] NOTICE[1170] chan_sip.c: Registration from '' failed for '195.181.168.138:60014' - Wrong password
[2020-04-26 18:52:37] SECURITY[1184] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-04-26T18:52:37.864-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="173",SessionID="0x7f6c086f7488",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.181.168.1
...
2020-04-27 07:05:01
80.82.67.47 attackspam
Blocked for port scanning.
Time: Sun Apr 26. 18:43:44 2020 +0200
IP: 80.82.67.47 (NL/Netherlands/-)

Sample of block hits:
Apr 26 18:40:47 vserv kernel: [11042780.651276] Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC= SRC=80.82.67.47 DST=[removed] LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=40166 PROTO=TCP SPT=46691 DPT=17241 WINDOW=1024 RES=0x00 SYN URGP=0
Apr 26 18:40:53 vserv kernel: [11042786.360226] Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC= SRC=80.82.67.47 DST=[removed] LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=19883 PROTO=TCP SPT=46691 DPT=13329 WINDOW=1024 RES=0x00 SYN URGP=0
Apr 26 18:41:24 vserv kernel: [11042817.798315] Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC= SRC=80.82.67.47 DST=[removed] LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=63792 PROTO=TCP SPT=46691 DPT=10863 WINDOW=1024 RES=0x00 SYN URGP=0
Apr 26 18:41:36 vserv kernel: [11042829.317431] Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC= SRC=80.82.67.47 DST=[removed] LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=27764 PROTO=TCP SPT=46691 DPT=18781 WINDOW=1024
2020-04-27 06:37:09
178.128.242.233 attack
Apr 26 17:04:01 ny01 sshd[16133]: Failed password for root from 178.128.242.233 port 45980 ssh2
Apr 26 17:07:49 ny01 sshd[16670]: Failed password for root from 178.128.242.233 port 56940 ssh2
2020-04-27 06:43:55
218.107.213.89 attackbotsspam
(pop3d) Failed POP3 login from 218.107.213.89 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 27 01:08:21 ir1 dovecot[264309]: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=218.107.213.89, lip=5.63.12.44, session=
2020-04-27 06:47:23
5.135.179.178 attackspambots
Apr 27 03:47:20 gw1 sshd[18458]: Failed password for root from 5.135.179.178 port 15885 ssh2
Apr 27 03:52:21 gw1 sshd[18659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.179.178
...
2020-04-27 06:55:39
222.186.175.202 attack
Apr 27 00:31:22 server sshd[5509]: Failed none for root from 222.186.175.202 port 55338 ssh2
Apr 27 00:31:25 server sshd[5509]: Failed password for root from 222.186.175.202 port 55338 ssh2
Apr 27 00:31:28 server sshd[5509]: Failed password for root from 222.186.175.202 port 55338 ssh2
2020-04-27 06:39:27
104.225.219.138 attack
SASL PLAIN auth failed: ruser=...
2020-04-27 07:00:11
2400:6180:0:d1::4ce:d001 attackspambots
Wordpress attack
2020-04-27 06:46:31
172.241.238.31 attackspam
REQUESTED PAGE: /
2020-04-27 07:04:35
5.105.1.86 attack
Apr 26 21:30:30  sshd[17922]: Connection closed by 5.105.1.86 [preauth]
2020-04-27 06:45:12

Recently Reported IPs

4.75.135.244 27.84.72.176 114.23.185.52 208.31.165.212
38.184.143.8 145.88.107.94 46.180.105.74 25.166.138.78
19.6.189.118 108.53.47.222 127.247.139.255 222.241.79.11
49.36.58.42 200.60.182.44 154.123.240.119 55.14.197.144
254.12.167.24 244.228.42.126 14.199.185.48 2.185.112.210