Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.80.234.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;48.80.234.111.			IN	A

;; AUTHORITY SECTION:
.			462	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061100 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 11 23:49:17 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 111.234.80.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.234.80.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.173.35.13 attack
Automatic report - Port Scan Attack
2019-10-20 07:09:50
93.137.203.150 attack
Invalid user mobil from 93.137.203.150 port 33782
2019-10-20 07:16:38
83.221.222.251 attack
Oct 19 22:27:56 ip-172-31-62-245 sshd\[1663\]: Invalid user teamspeakteamspeak from 83.221.222.251\
Oct 19 22:27:57 ip-172-31-62-245 sshd\[1663\]: Failed password for invalid user teamspeakteamspeak from 83.221.222.251 port 57136 ssh2\
Oct 19 22:32:44 ip-172-31-62-245 sshd\[1676\]: Invalid user P@ssword from 83.221.222.251\
Oct 19 22:32:46 ip-172-31-62-245 sshd\[1676\]: Failed password for invalid user P@ssword from 83.221.222.251 port 36422 ssh2\
Oct 19 22:37:30 ip-172-31-62-245 sshd\[1701\]: Invalid user lk from 83.221.222.251\
2019-10-20 07:05:15
192.169.139.6 attackbotsspam
Looking for resource vulnerabilities
2019-10-20 07:11:32
185.181.103.94 attack
389/tcp 1900/udp 23/tcp...
[2019-08-23/10-19]28pkt,2pt.(tcp),1pt.(udp)
2019-10-20 07:30:55
45.227.255.202 attackspambots
Oct 19 23:26:07 h2177944 kernel: \[4396277.890613\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.227.255.202 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=123 PROTO=TCP SPT=65531 DPT=3419 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 19 23:26:07 h2177944 kernel: \[4396277.890628\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.227.255.202 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=123 PROTO=TCP SPT=65531 DPT=3418 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 19 23:26:07 h2177944 kernel: \[4396277.890632\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.227.255.202 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=123 PROTO=TCP SPT=65531 DPT=3415 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 19 23:26:07 h2177944 kernel: \[4396277.890635\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.227.255.202 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=123 PROTO=TCP SPT=65531 DPT=3417 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 19 23:26:07 h2177944 kernel: \[4396277.890640\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.227.255.202 DST=85.214.117.9 LE
2019-10-20 07:06:08
141.98.81.38 attack
Oct 19 22:58:28 vpn01 sshd[7393]: Failed password for root from 141.98.81.38 port 9071 ssh2
Oct 19 22:58:28 vpn01 sshd[7395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.38
...
2019-10-20 07:35:09
222.186.175.183 attackbots
Oct 20 01:29:55 SilenceServices sshd[15866]: Failed password for root from 222.186.175.183 port 7424 ssh2
Oct 20 01:30:00 SilenceServices sshd[15866]: Failed password for root from 222.186.175.183 port 7424 ssh2
Oct 20 01:30:03 SilenceServices sshd[15866]: Failed password for root from 222.186.175.183 port 7424 ssh2
Oct 20 01:30:12 SilenceServices sshd[15866]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 7424 ssh2 [preauth]
2019-10-20 07:32:56
222.180.199.138 attackspambots
Invalid user user from 222.180.199.138 port 22274
2019-10-20 06:57:39
80.82.65.74 attack
Multiport scan : 11 ports scanned 1813 3128 4321 5003 6667 7012 7071 9000 9064 18186 53281
2019-10-20 07:34:30
103.30.235.61 attack
$f2bV_matches
2019-10-20 07:29:09
94.68.35.163 attackspam
Automatic report - Port Scan Attack
2019-10-20 07:14:14
142.44.163.100 attackspambots
Web App Attack
2019-10-20 07:12:40
185.166.131.147 attackbotsspam
LGS,WP GET /cms/wp-login.php
2019-10-20 07:25:28
159.89.104.243 attackbots
Invalid user QWERTY from 159.89.104.243 port 53918
2019-10-20 07:13:07

Recently Reported IPs

149.129.49.110 131.1.253.166 149.56.108.176 112.196.11.251
95.110.233.125 95.110.232.79 91.134.119.73 82.165.69.98
81.82.236.212 80.211.157.154 80.211.130.114 80.22.233.62
79.154.157.149 239.115.139.106 15.222.30.230 78.133.253.19
101.115.36.159 60.248.111.77 182.6.136.126 46.26.220.18