Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nürnberg

Region: Bavaria

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.161.75.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61349
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.161.75.80.			IN	A

;; AUTHORITY SECTION:
.			210	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020101 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 02 01:04:33 CST 2020
;; MSG SIZE  rcvd: 115
Host info
80.75.161.5.in-addr.arpa domain name pointer static.80.75.161.5.clients.your-server.de.
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

Non-authoritative answer:
80.75.161.5.in-addr.arpa	name = static.80.75.161.5.clients.your-server.de.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
142.93.60.53 attackbots
Jun 16 18:46:46 vps687878 sshd\[604\]: Failed password for invalid user sdk from 142.93.60.53 port 34614 ssh2
Jun 16 18:50:09 vps687878 sshd\[838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.60.53  user=root
Jun 16 18:50:12 vps687878 sshd\[838\]: Failed password for root from 142.93.60.53 port 36248 ssh2
Jun 16 18:53:33 vps687878 sshd\[1272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.60.53  user=nagios
Jun 16 18:53:35 vps687878 sshd\[1272\]: Failed password for nagios from 142.93.60.53 port 37878 ssh2
...
2020-06-17 01:14:13
89.133.110.47 attack
 UDP 89.133.110.47:12013 -> port 53, len 68
2020-06-17 00:40:04
5.63.151.121 attackspam
firewall-block, port(s): 3000/tcp
2020-06-17 00:45:11
118.175.230.238 attack
Unauthorised access (Jun 16) SRC=118.175.230.238 LEN=44 TTL=52 ID=7047 TCP DPT=23 WINDOW=13717 SYN
2020-06-17 01:10:58
117.58.241.69 attackspambots
2020-06-16T12:14:04.454037upcloud.m0sh1x2.com sshd[13883]: Invalid user rameez from 117.58.241.69 port 49728
2020-06-17 01:07:51
64.213.148.44 attackbots
Jun 16 14:22:14 ns382633 sshd\[31906\]: Invalid user apache from 64.213.148.44 port 47812
Jun 16 14:22:14 ns382633 sshd\[31906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.213.148.44
Jun 16 14:22:17 ns382633 sshd\[31906\]: Failed password for invalid user apache from 64.213.148.44 port 47812 ssh2
Jun 16 14:35:22 ns382633 sshd\[2284\]: Invalid user newuser from 64.213.148.44 port 49894
Jun 16 14:35:22 ns382633 sshd\[2284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.213.148.44
2020-06-17 01:03:30
79.120.118.82 attackspam
Jun 16 18:19:05 sip sshd[673423]: Invalid user hzh from 79.120.118.82 port 52955
Jun 16 18:19:06 sip sshd[673423]: Failed password for invalid user hzh from 79.120.118.82 port 52955 ssh2
Jun 16 18:22:34 sip sshd[673473]: Invalid user search from 79.120.118.82 port 52820
...
2020-06-17 00:47:50
36.72.218.248 attackbots
1592309991 - 06/16/2020 14:19:51 Host: 36.72.218.248/36.72.218.248 Port: 445 TCP Blocked
2020-06-17 01:01:29
125.64.94.132 attack
400 BAD REQUEST
2020-06-17 00:39:26
128.199.220.197 attackbotsspam
Invalid user student from 128.199.220.197 port 49194
2020-06-17 00:32:48
152.32.69.61 attack
RDP Brute-Force (Grieskirchen RZ2)
2020-06-17 00:29:29
159.65.86.239 attackbots
SSH brute force attempt
2020-06-17 00:46:08
123.56.158.49 attackbots
Port Scan detected!
...
2020-06-17 01:00:51
123.207.74.24 attack
$f2bV_matches
2020-06-17 01:00:21
222.186.175.202 attackspambots
Multiple SSH login attempts.
2020-06-17 01:04:59

Recently Reported IPs

106.174.15.59 108.113.56.237 208.130.144.214 86.178.224.151
206.57.135.214 129.150.254.166 61.115.38.118 2.46.106.208
110.83.9.50 5.45.22.240 151.121.27.254 38.87.8.227
140.243.234.60 191.149.73.165 157.241.216.30 123.194.128.115
91.79.222.56 88.10.134.83 145.196.171.90 189.203.149.102