Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.100.80.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.100.80.80.			IN	A

;; AUTHORITY SECTION:
.			310	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122601 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 27 09:06:45 CST 2021
;; MSG SIZE  rcvd: 105
Host info
Host 80.80.100.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.80.100.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.93.221.88 attackspam
Jun 22 06:05:04 Host-KLAX-C sshd[6407]: User root from 103.93.221.88 not allowed because not listed in AllowUsers
...
2020-06-22 23:31:12
119.45.125.168 attack
21 attempts against mh-ssh on river
2020-06-22 23:37:30
120.92.80.120 attack
Jun 22 06:22:44 dignus sshd[27584]: Invalid user guest from 120.92.80.120 port 47018
Jun 22 06:22:44 dignus sshd[27584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.80.120
Jun 22 06:22:47 dignus sshd[27584]: Failed password for invalid user guest from 120.92.80.120 port 47018 ssh2
Jun 22 06:26:51 dignus sshd[27993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.80.120  user=ubuntu
Jun 22 06:26:53 dignus sshd[27993]: Failed password for ubuntu from 120.92.80.120 port 3520 ssh2
...
2020-06-22 23:29:34
177.10.144.94 attack
Unauthorized IMAP connection attempt
2020-06-22 22:57:27
49.88.112.60 attack
Jun 22 16:43:27 server sshd[59325]: Failed password for root from 49.88.112.60 port 47976 ssh2
Jun 22 16:45:29 server sshd[60866]: Failed password for root from 49.88.112.60 port 15001 ssh2
Jun 22 16:45:32 server sshd[60866]: Failed password for root from 49.88.112.60 port 15001 ssh2
2020-06-22 23:33:32
185.39.10.65 attackbots
Jun 22 16:56:39 debian-2gb-nbg1-2 kernel: \[15096474.426829\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.39.10.65 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=19771 PROTO=TCP SPT=43218 DPT=34583 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-22 23:12:07
125.88.144.56 attackspam
Port Scan detected!
...
2020-06-22 22:52:33
116.93.119.48 attack
2020-06-22 07:23:10.993003-0500  localhost sshd[23168]: Failed password for invalid user ftb from 116.93.119.48 port 42289 ssh2
2020-06-22 23:19:17
147.0.22.179 attack
2020-06-22T10:00:38.5340661495-001 sshd[6252]: Invalid user liu from 147.0.22.179 port 55470
2020-06-22T10:00:38.5371201495-001 sshd[6252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-147-0-22-179.central.biz.rr.com
2020-06-22T10:00:38.5340661495-001 sshd[6252]: Invalid user liu from 147.0.22.179 port 55470
2020-06-22T10:00:40.0021551495-001 sshd[6252]: Failed password for invalid user liu from 147.0.22.179 port 55470 ssh2
2020-06-22T10:03:11.3794601495-001 sshd[6442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-147-0-22-179.central.biz.rr.com  user=root
2020-06-22T10:03:13.1809931495-001 sshd[6442]: Failed password for root from 147.0.22.179 port 55462 ssh2
...
2020-06-22 23:10:16
122.152.197.6 attackspambots
IP blocked
2020-06-22 23:28:52
41.193.46.251 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-22 23:32:11
96.44.162.82 attackspam
SMTP Screen: 96.44.162.82 (United States): connected 11 times within 2 minutes
2020-06-22 22:58:26
178.128.162.10 attackspambots
...
2020-06-22 23:00:16
111.229.15.228 attackbotsspam
frenzy
2020-06-22 22:54:30
210.206.92.137 attackspambots
Jun 22 08:29:25 Host-KLAX-C sshd[12015]: User root from 210.206.92.137 not allowed because not listed in AllowUsers
...
2020-06-22 23:04:40

Recently Reported IPs

135.30.156.152 245.200.144.53 51.79.144.225 178.212.254.38
12.106.241.0 123.124.17.122 195.149.102.137 174.188.175.169
34.22.65.192 50.39.82.220 149.218.132.97 92.203.90.127
34.18.165.198 159.241.64.61 61.203.48.199 3.127.35.158
208.73.182.129 130.85.130.22 48.23.78.0 10.136.35.213