Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vienna

Region: Vienna

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.108.152.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.108.152.8.			IN	A

;; AUTHORITY SECTION:
.			356	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100902 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 10 08:54:27 CST 2020
;; MSG SIZE  rcvd: 116
Host info
8.152.108.80.in-addr.arpa domain name pointer 80-108-152-8.cable.dynamic.surfer.at.
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

Non-authoritative answer:
8.152.108.80.in-addr.arpa	name = 80-108-152-8.cable.dynamic.surfer.at.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
45.117.67.199 attack
Unauthorized connection attempt from IP address 45.117.67.199 on Port 445(SMB)
2020-03-07 01:39:19
196.41.122.37 attack
196.41.122.37 - - [06/Mar/2020:13:48:57 +0100] "GET /wp-login.php HTTP/1.1" 200 5347 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
196.41.122.37 - - [06/Mar/2020:13:48:58 +0100] "POST /wp-login.php HTTP/1.1" 200 6246 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
196.41.122.37 - - [06/Mar/2020:14:30:44 +0100] "GET /wp-login.php HTTP/1.1" 200 5268 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-07 01:39:51
103.53.45.6 attackspambots
Unauthorized connection attempt from IP address 103.53.45.6 on Port 445(SMB)
2020-03-07 01:33:22
46.101.206.205 attackspambots
Mar  6 11:21:05 plusreed sshd[3404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.206.205  user=root
Mar  6 11:21:07 plusreed sshd[3404]: Failed password for root from 46.101.206.205 port 49606 ssh2
...
2020-03-07 01:44:38
173.245.89.211 attackbotsspam
trying to authenticate into mail server
2020-03-07 01:21:15
176.59.132.49 attackspam
Email rejected due to spam filtering
2020-03-07 01:34:19
14.247.102.229 attackbots
Email rejected due to spam filtering
2020-03-07 01:16:34
14.245.61.49 attack
Email rejected due to spam filtering
2020-03-07 01:28:00
25.111.92.37 attackbotsspam
Scan detected and blocked 2020.03.06 14:30:38
2020-03-07 01:51:00
139.199.69.199 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-07 01:52:20
131.221.66.10 attackspambots
Email rejected due to spam filtering
2020-03-07 01:30:05
49.88.112.112 attack
Failed password for root from 49.88.112.112 port 52723 ssh2
Failed password for root from 49.88.112.112 port 52723 ssh2
Failed password for root from 49.88.112.112 port 52723 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112  user=root
Failed password for root from 49.88.112.112 port 12556 ssh2
2020-03-07 01:11:44
82.117.235.56 attack
03/06/2020-08:31:00.730236 82.117.235.56 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-07 01:19:16
165.73.122.234 attack
Honeypot attack, port: 81, PTR: 165-73-122-234.ip.afrihost.capetown.
2020-03-07 01:48:56
123.19.210.112 attackspambots
Email rejected due to spam filtering
2020-03-07 01:29:06

Recently Reported IPs

206.211.180.234 176.52.116.237 12.127.156.8 81.84.254.123
84.107.247.223 116.149.239.233 24.8.147.48 105.156.179.220
211.14.98.118 74.48.86.41 73.54.126.162 134.35.88.120
72.84.67.170 166.159.100.135 218.189.64.18 72.149.81.2
105.248.53.167 218.252.151.52 104.33.126.4 168.10.55.26