Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.219.80.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22606
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.219.80.73.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100900 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 09 21:30:11 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 73.80.219.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 73.80.219.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
130.162.64.72 attackbotsspam
May 14 07:58:58 rotator sshd\[30699\]: Failed password for root from 130.162.64.72 port 9247 ssh2May 14 08:02:02 rotator sshd\[31498\]: Invalid user ts3server4 from 130.162.64.72May 14 08:02:03 rotator sshd\[31498\]: Failed password for invalid user ts3server4 from 130.162.64.72 port 35348 ssh2May 14 08:05:11 rotator sshd\[31834\]: Invalid user donna from 130.162.64.72May 14 08:05:13 rotator sshd\[31834\]: Failed password for invalid user donna from 130.162.64.72 port 61450 ssh2May 14 08:08:28 rotator sshd\[32329\]: Invalid user susan from 130.162.64.72
...
2020-05-14 18:54:24
180.76.97.180 attackspam
May 14 11:01:53 [host] sshd[32011]: Invalid user d
May 14 11:01:53 [host] sshd[32011]: pam_unix(sshd:
May 14 11:01:55 [host] sshd[32011]: Failed passwor
2020-05-14 18:10:45
80.13.68.104 attackspambots
Dovecot Invalid User Login Attempt.
2020-05-14 18:52:32
41.160.237.10 attackspambots
May 14 11:47:24 ovpn sshd\[4519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.160.237.10  user=root
May 14 11:47:25 ovpn sshd\[4519\]: Failed password for root from 41.160.237.10 port 39010 ssh2
May 14 11:50:40 ovpn sshd\[5342\]: Invalid user postgres from 41.160.237.10
May 14 11:50:40 ovpn sshd\[5342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.160.237.10
May 14 11:50:42 ovpn sshd\[5342\]: Failed password for invalid user postgres from 41.160.237.10 port 50944 ssh2
2020-05-14 18:20:33
23.129.64.202 attack
IDS admin
2020-05-14 18:53:07
182.61.46.245 attackspam
Invalid user devuser from 182.61.46.245 port 49142
2020-05-14 18:17:11
171.222.121.99 attackbotsspam
Attempts against SMTP/SSMTP
2020-05-14 18:40:23
103.212.211.163 attackspam
May 14 10:46:43 webhost01 sshd[5619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.212.211.163
May 14 10:46:45 webhost01 sshd[5619]: Failed password for invalid user nagesh from 103.212.211.163 port 58048 ssh2
...
2020-05-14 18:36:59
118.69.34.146 attackbotsspam
May 14 05:06:58 venus2 sshd[12726]: Did not receive identification string from 118.69.34.146
May 14 05:07:03 venus2 sshd[12780]: Invalid user tech from 118.69.34.146
May 14 05:07:05 venus2 sshd[12780]: Failed password for invalid user tech from 118.69.34.146 port 59684 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=118.69.34.146
2020-05-14 18:35:21
125.215.207.44 attackbots
May 14 12:21:11 home sshd[29530]: Failed password for root from 125.215.207.44 port 54911 ssh2
May 14 12:23:57 home sshd[29986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.215.207.44
May 14 12:23:59 home sshd[29986]: Failed password for invalid user jboss from 125.215.207.44 port 49123 ssh2
...
2020-05-14 18:51:06
36.67.16.127 attackspam
20/5/13@23:46:57: FAIL: Alarm-Network address from=36.67.16.127
20/5/13@23:46:57: FAIL: Alarm-Network address from=36.67.16.127
...
2020-05-14 18:25:54
101.96.113.50 attack
$f2bV_matches
2020-05-14 18:33:12
113.181.125.176 attackbotsspam
Lines containing failures of 113.181.125.176
May 14 05:08:13 shared12 sshd[13107]: Did not receive identification string from 113.181.125.176 port 59876
May 14 05:08:18 shared12 sshd[13109]: Invalid user 666666 from 113.181.125.176 port 60093
May 14 05:08:18 shared12 sshd[13109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.181.125.176
May 14 05:08:21 shared12 sshd[13109]: Failed password for invalid user 666666 from 113.181.125.176 port 60093 ssh2
May 14 05:08:21 shared12 sshd[13109]: Connection closed by invalid user 666666 113.181.125.176 port 60093 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.181.125.176
2020-05-14 18:40:37
14.185.189.79 attackspam
May 14 06:06:43 b2b-pharm sshd[29094]: Did not receive identification string from 14.185.189.79 port 49259
May 14 06:06:48 b2b-pharm sshd[29095]: Invalid user admin1 from 14.185.189.79 port 49574
May 14 06:06:48 b2b-pharm sshd[29095]: Invalid user admin1 from 14.185.189.79 port 49574


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.185.189.79
2020-05-14 18:30:38
185.175.93.27 attack
05/14/2020-05:41:06.328114 185.175.93.27 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-14 18:22:28

Recently Reported IPs

47.237.109.208 47.237.116.60 47.237.71.60 47.236.23.213
68.183.60.203 159.67.193.114 159.67.193.173 47.237.99.111
47.237.86.122 185.180.140.135 47.237.170.214 47.237.165.4
47.237.161.142 47.237.133.153 159.223.101.100 47.236.242.135
47.237.165.123 47.237.170.23 8.219.61.177 27.68.7.239