Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
80.108.129.205 attackbotsspam
Feb 22 14:10:05 plex sshd[5377]: Invalid user biguiqi from 80.108.129.205 port 52974
2020-02-23 00:21:42
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.108.129.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.108.129.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:15:24 CST 2025
;; MSG SIZE  rcvd: 107
Host info
150.129.108.80.in-addr.arpa domain name pointer 80-108-129-150.cable.dynamic.surfer.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.129.108.80.in-addr.arpa	name = 80-108-129-150.cable.dynamic.surfer.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.204.134.82 attackspambots
Automatic report - Port Scan Attack
2019-10-09 23:52:26
5.69.203.128 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/5.69.203.128/ 
 GB - 1H : (86)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GB 
 NAME ASN : ASN5607 
 
 IP : 5.69.203.128 
 
 CIDR : 5.64.0.0/13 
 
 PREFIX COUNT : 35 
 
 UNIQUE IP COUNT : 5376768 
 
 
 WYKRYTE ATAKI Z ASN5607 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 3 
 24H - 9 
 
 DateTime : 2019-10-09 13:34:51 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-10-09 23:50:22
210.51.161.210 attack
Oct  9 19:09:31 server sshd\[21063\]: User root from 210.51.161.210 not allowed because listed in DenyUsers
Oct  9 19:09:31 server sshd\[21063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.51.161.210  user=root
Oct  9 19:09:32 server sshd\[21063\]: Failed password for invalid user root from 210.51.161.210 port 45736 ssh2
Oct  9 19:13:39 server sshd\[16955\]: User root from 210.51.161.210 not allowed because listed in DenyUsers
Oct  9 19:13:39 server sshd\[16955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.51.161.210  user=root
2019-10-10 00:18:24
198.108.66.100 attackbots
" "
2019-10-09 23:51:59
79.110.201.195 attack
2019-10-09T11:25:54.510659hub.schaetter.us sshd\[26915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.110.201.195  user=root
2019-10-09T11:25:55.808355hub.schaetter.us sshd\[26915\]: Failed password for root from 79.110.201.195 port 43412 ssh2
2019-10-09T11:30:04.715424hub.schaetter.us sshd\[26950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.110.201.195  user=root
2019-10-09T11:30:06.664781hub.schaetter.us sshd\[26950\]: Failed password for root from 79.110.201.195 port 55184 ssh2
2019-10-09T11:34:28.164887hub.schaetter.us sshd\[26986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.110.201.195  user=root
...
2019-10-10 00:00:41
51.77.141.158 attackspam
Oct  9 18:24:00 core sshd[27664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.141.158  user=root
Oct  9 18:24:02 core sshd[27664]: Failed password for root from 51.77.141.158 port 58611 ssh2
...
2019-10-10 00:26:55
185.176.27.42 attack
firewall-block, port(s): 14251/tcp, 20310/tcp, 28370/tcp, 47591/tcp
2019-10-10 00:01:14
54.36.180.236 attackbotsspam
Oct  9 13:18:05 server sshd[35957]: Failed password for root from 54.36.180.236 port 39791 ssh2
Oct  9 13:31:04 server sshd[37492]: Failed password for root from 54.36.180.236 port 40676 ssh2
Oct  9 13:34:37 server sshd[37926]: Failed password for root from 54.36.180.236 port 60837 ssh2
2019-10-09 23:55:44
81.134.41.100 attackbots
Oct  9 22:46:24 webhost01 sshd[16117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.134.41.100
Oct  9 22:46:26 webhost01 sshd[16117]: Failed password for invalid user Computer@1 from 81.134.41.100 port 43188 ssh2
...
2019-10-10 00:22:16
89.221.58.112 attackbotsspam
Port scan on 1 port(s): 5555
2019-10-09 23:58:00
118.27.39.224 attack
Oct  9 17:55:14 MK-Soft-VM6 sshd[19882]: Failed password for root from 118.27.39.224 port 54696 ssh2
...
2019-10-10 00:13:25
211.252.84.191 attackspambots
Oct  9 16:45:52 MK-Soft-Root2 sshd[24012]: Failed password for root from 211.252.84.191 port 50408 ssh2
...
2019-10-10 00:12:10
112.84.90.163 attackspam
Oct  9 14:34:13 elektron postfix/smtpd\[5347\]: NOQUEUE: reject: RCPT from unknown\[112.84.90.163\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[112.84.90.163\]\; from=\ to=\ proto=ESMTP helo=\
Oct  9 14:34:27 elektron postfix/smtpd\[5347\]: NOQUEUE: reject: RCPT from unknown\[112.84.90.163\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[112.84.90.163\]\; from=\ to=\ proto=ESMTP helo=\
Oct  9 14:35:11 elektron postfix/smtpd\[1324\]: NOQUEUE: reject: RCPT from unknown\[112.84.90.163\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[112.84.90.163\]\; from=\ to=\ proto=ESMTP helo=\
2019-10-10 00:07:55
118.24.55.171 attackspam
Automatic report - Banned IP Access
2019-10-10 00:10:29
36.66.56.234 attackbots
2019-10-09T15:56:58.966917abusebot-4.cloudsearch.cf sshd\[30723\]: Invalid user Action2017 from 36.66.56.234 port 43876
2019-10-10 00:00:58

Recently Reported IPs

109.147.80.169 33.113.140.235 31.23.187.34 222.224.129.19
75.183.9.120 20.5.161.82 59.146.97.200 250.200.120.193
3.0.121.95 208.194.34.131 39.171.109.141 143.133.5.122
224.204.69.1 12.131.154.189 3.83.71.27 142.7.158.150
24.140.173.70 34.113.121.67 126.187.180.170 40.0.92.192