Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.168.100.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62902
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.168.100.80.			IN	A

;; AUTHORITY SECTION:
.			28	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 166 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 00:43:51 CST 2025
;; MSG SIZE  rcvd: 106
Host info
80.100.168.58.in-addr.arpa domain name pointer cpe-58-168-100-80.nb01.nsw.asp.telstra.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.100.168.58.in-addr.arpa	name = cpe-58-168-100-80.nb01.nsw.asp.telstra.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.153.196.225 attackbotsspam
Jun  6 03:36:42 debian kernel: [306363.210888] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=185.153.196.225 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=33788 PROTO=TCP SPT=49648 DPT=5007 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-06 09:00:16
185.173.35.1 attack
firewall-block, port(s): 143/tcp
2020-06-06 08:58:15
219.84.201.39 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-06 08:50:28
185.156.73.67 attackbots
06/05/2020-20:17:37.036958 185.156.73.67 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-06 08:58:40
46.101.33.198 attackbots
Jun  6 03:03:05 eventyay sshd[29536]: Failed password for root from 46.101.33.198 port 44594 ssh2
Jun  6 03:06:54 eventyay sshd[29636]: Failed password for root from 46.101.33.198 port 48636 ssh2
...
2020-06-06 09:18:06
195.54.160.166 attack
Port scan: Attack repeated for 24 hours
2020-06-06 08:55:23
51.91.212.79 attack
 TCP (SYN) 51.91.212.79:58733 -> port 6008, len 44
2020-06-06 08:44:30
94.102.56.215 attack
firewall-block, port(s): 41083/udp, 41087/udp
2020-06-06 09:04:56
195.54.166.225 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 39786 proto: TCP cat: Misc Attack
2020-06-06 08:52:11
221.5.225.158 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-06 08:49:45
45.227.255.204 attack
 TCP (SYN) 45.227.255.204:31724 -> port 1080, len 60
2020-06-06 09:18:33
141.98.9.157 attack
Jun  6 02:56:43 vpn01 sshd[3172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157
Jun  6 02:56:44 vpn01 sshd[3172]: Failed password for invalid user admin from 141.98.9.157 port 41451 ssh2
...
2020-06-06 09:01:34
92.53.65.40 attackbots
06/05/2020-18:49:57.178707 92.53.65.40 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-06 09:07:56
185.156.73.54 attackspam
SmallBizIT.US 12 packets to tcp(3379,3381,3382,3389,3401,4444,5454,8585,23389,33390,33392,33393)
2020-06-06 08:59:07
92.63.194.104 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 90 - port: 1723 proto: TCP cat: Misc Attack
2020-06-06 09:07:37

Recently Reported IPs

198.233.117.220 233.205.29.19 220.92.29.54 162.13.83.65
104.38.181.192 139.140.244.135 212.4.33.161 96.245.145.61
122.242.81.65 64.136.76.43 72.210.220.93 13.182.104.214
24.178.135.59 175.217.202.97 217.107.251.77 80.72.110.107
224.14.44.49 29.150.142.165 240.61.211.86 68.237.46.175