Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.91.99.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;67.91.99.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011301 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 14 04:39:43 CST 2025
;; MSG SIZE  rcvd: 104
Host info
80.99.91.67.in-addr.arpa domain name pointer ip67-91-99-80.z99-91-67.customer.algx.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.99.91.67.in-addr.arpa	name = ip67-91-99-80.z99-91-67.customer.algx.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.84.70.193 attackbots
SSH invalid-user multiple login attempts
2019-12-19 03:21:37
113.199.40.202 attack
Dec 18 22:41:05 itv-usvr-01 sshd[25415]: Invalid user vaudet from 113.199.40.202
Dec 18 22:41:05 itv-usvr-01 sshd[25415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.199.40.202
Dec 18 22:41:05 itv-usvr-01 sshd[25415]: Invalid user vaudet from 113.199.40.202
Dec 18 22:41:06 itv-usvr-01 sshd[25415]: Failed password for invalid user vaudet from 113.199.40.202 port 48259 ssh2
Dec 18 22:47:20 itv-usvr-01 sshd[25633]: Invalid user ftpuser from 113.199.40.202
2019-12-19 03:06:54
200.245.177.10 attackbots
1576679536 - 12/18/2019 15:32:16 Host: 200.245.177.10/200.245.177.10 Port: 445 TCP Blocked
2019-12-19 02:55:13
74.50.224.194 attackbotsspam
Automatic report - XMLRPC Attack
2019-12-19 03:18:55
159.203.122.149 attack
Dec 18 08:42:45 tdfoods sshd\[26579\]: Invalid user ftp from 159.203.122.149
Dec 18 08:42:45 tdfoods sshd\[26579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.122.149
Dec 18 08:42:48 tdfoods sshd\[26579\]: Failed password for invalid user ftp from 159.203.122.149 port 45052 ssh2
Dec 18 08:47:32 tdfoods sshd\[27027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.122.149  user=root
Dec 18 08:47:35 tdfoods sshd\[27027\]: Failed password for root from 159.203.122.149 port 47542 ssh2
2019-12-19 03:02:07
40.92.66.44 attackbots
Dec 18 17:33:46 debian-2gb-vpn-nbg1-1 kernel: [1057990.031838] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.66.44 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=61142 DF PROTO=TCP SPT=38190 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-19 03:06:35
66.70.245.115 attackbots
WordPress wp-login brute force :: 66.70.245.115 0.088 BYPASS [18/Dec/2019:14:33:17  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-19 03:26:12
122.228.19.80 attackspam
122.228.19.80 was recorded 105 times by 26 hosts attempting to connect to the following ports: 8087,5443,12345,1883,3388,4800,3260,623,9090,25,2048,8003,8123,4022,17185,21,1025,264,83,502,990,16993,2083,4070,520,5009,1010,993,2000,515,2087,771,4040,79,626,7547,636,9595,2123,40001,8069,9943,37777,2404,5006,8000,8060,3690,113,631,64738,3268,9306,5985,1962,9418,8554,8889,1777,1521,110,587,16992,8333,8010,5222,41794,5351,5984,7002,2480,3306,9000,28017,9600,4500,37215,789,3283,554,50070,9295,25565,1194,9191,5000,2525. Incident counter (4h, 24h, all-time): 105, 568, 20617
2019-12-19 03:25:54
51.254.37.192 attackspambots
Dec 18 19:19:37 localhost sshd[7696]: Failed password for invalid user matt from 51.254.37.192 port 51132 ssh2
Dec 18 19:27:41 localhost sshd[7907]: Failed password for root from 51.254.37.192 port 38964 ssh2
Dec 18 19:32:24 localhost sshd[7981]: Failed password for invalid user 123 from 51.254.37.192 port 47782 ssh2
2019-12-19 03:04:18
103.104.160.42 attackbotsspam
TCP Port: 25      invalid blocked  abuseat-org also barracuda and zen-spamhaus           (740)
2019-12-19 02:57:27
68.183.50.149 attackbotsspam
Dec 18 17:46:26 localhost sshd\[6007\]: Invalid user gloria from 68.183.50.149 port 47266
Dec 18 17:46:26 localhost sshd\[6007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.50.149
Dec 18 17:46:29 localhost sshd\[6007\]: Failed password for invalid user gloria from 68.183.50.149 port 47266 ssh2
2019-12-19 03:13:44
94.23.27.21 attackbotsspam
Dec 18 08:48:48 php1 sshd\[20849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns367620.ip-94-23-27.eu  user=root
Dec 18 08:48:50 php1 sshd\[20849\]: Failed password for root from 94.23.27.21 port 56580 ssh2
Dec 18 08:55:33 php1 sshd\[21742\]: Invalid user simply from 94.23.27.21
Dec 18 08:55:33 php1 sshd\[21742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns367620.ip-94-23-27.eu
Dec 18 08:55:35 php1 sshd\[21742\]: Failed password for invalid user simply from 94.23.27.21 port 36210 ssh2
2019-12-19 03:06:13
182.254.145.29 attack
Dec 18 16:33:59 MK-Soft-VM6 sshd[1546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.145.29 
Dec 18 16:34:01 MK-Soft-VM6 sshd[1546]: Failed password for invalid user kip from 182.254.145.29 port 55056 ssh2
...
2019-12-19 02:58:01
182.61.11.3 attackspam
$f2bV_matches
2019-12-19 03:12:40
45.113.70.146 attackbots
Fail2Ban Ban Triggered
2019-12-19 03:25:36

Recently Reported IPs

104.28.157.20 226.126.173.101 104.28.157.102 242.30.45.149
35.125.171.95 44.157.177.72 66.241.13.92 178.68.117.252
35.248.190.29 153.146.210.107 95.243.16.117 158.132.217.117
64.141.50.220 236.20.78.122 138.172.139.137 203.125.141.99
229.166.229.190 148.162.112.64 248.122.180.194 221.109.226.111