Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.131.6.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59216
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.131.6.139.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090101 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 02 05:48:41 CST 2019
;; MSG SIZE  rcvd: 116
Host info
139.6.131.80.in-addr.arpa domain name pointer p5083068B.dip0.t-ipconnect.de.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
139.6.131.80.in-addr.arpa	name = p5083068B.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.42.101.123 attack
Invalid user admin from 41.42.101.123 port 50401
2019-10-20 03:23:11
41.232.30.91 attackbotsspam
Invalid user admin from 41.232.30.91 port 50255
2019-10-20 03:22:26
195.16.41.170 attackspam
Unauthorized SSH login attempts
2019-10-20 02:50:40
61.91.57.34 attack
Invalid user admin from 61.91.57.34 port 48627
2019-10-20 03:16:40
85.167.32.224 attack
2019-10-19T18:14:19.253463abusebot-5.cloudsearch.cf sshd\[8876\]: Invalid user support from 85.167.32.224 port 49778
2019-10-20 03:13:20
183.89.237.111 attackbots
Invalid user admin from 183.89.237.111 port 37229
2019-10-20 02:53:22
68.228.92.138 attackspambots
(sshd) Failed SSH login from 68.228.92.138 (US/United States/ip68-228-92-138.oc.oc.cox.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Oct 19 13:21:31 host sshd[97896]: Invalid user pi from 68.228.92.138 port 60093
2019-10-20 03:15:51
139.190.201.237 attackspam
Invalid user admin from 139.190.201.237 port 36658
2019-10-20 03:00:02
117.104.187.188 attackspambots
Invalid user admin from 117.104.187.188 port 47434
2019-10-20 03:02:54
202.137.155.203 attack
Invalid user system from 202.137.155.203 port 48554
2019-10-20 02:46:39
113.173.176.10 attack
Invalid user admin from 113.173.176.10 port 56012
2019-10-20 03:04:38
45.182.158.190 attackbotsspam
Invalid user admin from 45.182.158.190 port 33283
2019-10-20 03:20:28
218.151.3.129 attack
Invalid user admin from 218.151.3.129 port 54320
2019-10-20 02:46:02
113.162.158.51 attack
Invalid user admin from 113.162.158.51 port 45362
2019-10-20 03:06:57
120.136.167.74 attack
Brute force attempt
2019-10-20 03:01:44

Recently Reported IPs

87.68.187.171 138.99.16.120 123.185.120.20 212.237.14.203
223.237.2.237 197.59.227.136 144.136.211.164 182.32.208.4
103.194.172.3 217.53.20.126 52.163.126.214 62.11.190.181
177.11.147.148 39.97.202.22 118.171.118.195 206.9.200.145
123.113.199.170 34.148.133.141 153.117.211.32 179.129.225.135