Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wels

Region: Oberosterreich

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.123.138.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.123.138.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121703 1800 900 604800 86400

;; Query time: 145 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 18 12:06:42 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 164.138.123.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.138.123.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
60.169.75.58 attack
Oct 13 03:30:28 localhost sshd\[2363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.169.75.58  user=root
Oct 13 03:30:30 localhost sshd\[2363\]: Failed password for root from 60.169.75.58 port 59656 ssh2
Oct 13 03:37:06 localhost sshd\[2611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.169.75.58  user=root
Oct 13 03:37:07 localhost sshd\[2611\]: Failed password for root from 60.169.75.58 port 41774 ssh2
Oct 13 03:43:41 localhost sshd\[2934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.169.75.58  user=root
...
2019-10-13 19:46:16
222.186.175.215 attackspambots
Oct 13 01:41:44 auw2 sshd\[3550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Oct 13 01:41:46 auw2 sshd\[3550\]: Failed password for root from 222.186.175.215 port 25020 ssh2
Oct 13 01:41:50 auw2 sshd\[3550\]: Failed password for root from 222.186.175.215 port 25020 ssh2
Oct 13 01:41:55 auw2 sshd\[3550\]: Failed password for root from 222.186.175.215 port 25020 ssh2
Oct 13 01:41:59 auw2 sshd\[3550\]: Failed password for root from 222.186.175.215 port 25020 ssh2
2019-10-13 19:46:46
36.112.137.55 attackbotsspam
Oct 13 11:47:13 vps647732 sshd[21616]: Failed password for root from 36.112.137.55 port 43977 ssh2
...
2019-10-13 19:32:49
114.67.82.156 attack
2019-10-13T10:24:15.132435hub.schaetter.us sshd\[12974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.82.156  user=root
2019-10-13T10:24:16.478021hub.schaetter.us sshd\[12974\]: Failed password for root from 114.67.82.156 port 41646 ssh2
2019-10-13T10:29:04.199522hub.schaetter.us sshd\[13014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.82.156  user=root
2019-10-13T10:29:06.553602hub.schaetter.us sshd\[13014\]: Failed password for root from 114.67.82.156 port 51680 ssh2
2019-10-13T10:34:06.887422hub.schaetter.us sshd\[13052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.82.156  user=root
...
2019-10-13 19:21:25
46.38.144.32 attack
Oct 13 12:51:04 relay postfix/smtpd\[20749\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 13 12:51:42 relay postfix/smtpd\[26596\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 13 12:54:38 relay postfix/smtpd\[26177\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 13 12:55:23 relay postfix/smtpd\[16658\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 13 12:58:20 relay postfix/smtpd\[26177\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-13 19:06:58
189.205.60.198 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-10-13 19:24:30
222.186.31.136 attackbots
Oct 13 13:21:24 localhost sshd\[29992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136  user=root
Oct 13 13:21:26 localhost sshd\[29992\]: Failed password for root from 222.186.31.136 port 30266 ssh2
Oct 13 13:21:28 localhost sshd\[29992\]: Failed password for root from 222.186.31.136 port 30266 ssh2
2019-10-13 19:27:22
45.45.45.45 attack
13.10.2019 11:01:53 Recursive DNS scan
2019-10-13 19:24:02
188.186.211.60 attackspam
Port 1433 Scan
2019-10-13 19:43:56
192.169.156.194 attack
leo_www
2019-10-13 19:25:47
18.219.116.183 attackspambots
Housing assistance scam

To blaze1122 
Housing Assistance is available near you! 
Learn more, eligibility info here

Review your state’s housing benefits and find out how you can apply easily.












unsubscribe
or write to: 







to stop receiving messages and unsubscribe these notifications click here
2019-10-13 19:05:14
142.93.163.77 attack
Oct 13 08:55:05 vmanager6029 sshd\[5200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77  user=root
Oct 13 08:55:07 vmanager6029 sshd\[5200\]: Failed password for root from 142.93.163.77 port 58786 ssh2
Oct 13 08:59:23 vmanager6029 sshd\[5284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77  user=root
2019-10-13 19:37:13
60.248.28.105 attackbotsspam
Oct 13 12:27:34 DAAP sshd[19182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.248.28.105  user=root
Oct 13 12:27:36 DAAP sshd[19182]: Failed password for root from 60.248.28.105 port 40174 ssh2
Oct 13 12:31:41 DAAP sshd[19218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.248.28.105  user=root
Oct 13 12:31:43 DAAP sshd[19218]: Failed password for root from 60.248.28.105 port 59805 ssh2
...
2019-10-13 19:23:49
190.36.43.75 attackspambots
Port 1433 Scan
2019-10-13 19:41:52
182.61.105.104 attackspambots
Oct 13 08:30:34 localhost sshd\[26030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.104  user=root
Oct 13 08:30:36 localhost sshd\[26030\]: Failed password for root from 182.61.105.104 port 42268 ssh2
Oct 13 08:41:45 localhost sshd\[26167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.104  user=root
...
2019-10-13 19:39:44

Recently Reported IPs

46.193.225.146 175.130.106.73 66.194.62.180 123.133.28.71
237.116.239.51 100.161.185.242 161.28.6.28 76.17.208.116
5.192.54.250 242.48.30.31 250.205.147.233 235.71.226.135
212.103.231.223 130.31.123.167 48.3.208.106 147.123.119.218
165.2.149.43 119.126.253.240 233.159.60.61 56.186.159.224