Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.132.96.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.132.96.94.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011200 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 14:43:50 CST 2025
;; MSG SIZE  rcvd: 105
Host info
94.96.132.80.in-addr.arpa domain name pointer p5084605e.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.96.132.80.in-addr.arpa	name = p5084605e.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.54.24.47 attackspambots
Dec 30 03:07:02 plusreed sshd[8945]: Invalid user password0000 from 106.54.24.47
...
2019-12-30 16:07:29
109.22.102.75 attackbotsspam
Dec 30 10:06:54 server sshd\[24211\]: Invalid user silvarman from 109.22.102.75
Dec 30 10:06:54 server sshd\[24211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.102.22.109.rev.sfr.net 
Dec 30 10:06:56 server sshd\[24211\]: Failed password for invalid user silvarman from 109.22.102.75 port 49468 ssh2
Dec 30 11:05:13 server sshd\[3711\]: Invalid user vasilica from 109.22.102.75
Dec 30 11:05:13 server sshd\[3711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.102.22.109.rev.sfr.net 
...
2019-12-30 16:26:42
125.161.136.112 attack
Dec 30 07:29:18 herz-der-gamer sshd[25521]: Invalid user msfadmin from 125.161.136.112 port 39739
Dec 30 07:29:18 herz-der-gamer sshd[25521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.161.136.112
Dec 30 07:29:18 herz-der-gamer sshd[25521]: Invalid user msfadmin from 125.161.136.112 port 39739
Dec 30 07:29:20 herz-der-gamer sshd[25521]: Failed password for invalid user msfadmin from 125.161.136.112 port 39739 ssh2
...
2019-12-30 16:00:47
190.187.104.146 attack
Dec 30 05:36:31 ws12vmsma01 sshd[42469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.187.104.146 
Dec 30 05:36:31 ws12vmsma01 sshd[42469]: Invalid user lontierra from 190.187.104.146
Dec 30 05:36:33 ws12vmsma01 sshd[42469]: Failed password for invalid user lontierra from 190.187.104.146 port 56210 ssh2
...
2019-12-30 16:02:13
13.57.209.63 attack
port scan and connect, tcp 80 (http)
2019-12-30 16:18:20
138.201.34.38 attack
Probing for vulnerable services
2019-12-30 16:11:18
195.9.108.214 attackbotsspam
Lines containing failures of 195.9.108.214
Dec 30 07:19:27 MAKserver05 sshd[24683]: Invalid user support from 195.9.108.214 port 49478
Dec 30 07:19:27 MAKserver05 sshd[24683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.108.214 
Dec 30 07:19:29 MAKserver05 sshd[24683]: Failed password for invalid user support from 195.9.108.214 port 49478 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=195.9.108.214
2019-12-30 16:38:20
51.91.212.81 attackspam
Dec 30 08:52:41 debian-2gb-nbg1-2 kernel: \[1345069.642421\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.91.212.81 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=44912 DPT=1025 WINDOW=65535 RES=0x00 SYN URGP=0
2019-12-30 16:14:35
34.76.172.157 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-12-30 16:07:42
103.83.36.101 attack
103.83.36.101 - - \[30/Dec/2019:08:45:42 +0100\] "POST /wp-login.php HTTP/1.0" 200 7672 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.83.36.101 - - \[30/Dec/2019:08:45:45 +0100\] "POST /wp-login.php HTTP/1.0" 200 7502 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.83.36.101 - - \[30/Dec/2019:08:45:47 +0100\] "POST /wp-login.php HTTP/1.0" 200 7496 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-30 16:37:56
110.137.82.223 attackspambots
1577687330 - 12/30/2019 07:28:50 Host: 110.137.82.223/110.137.82.223 Port: 445 TCP Blocked
2019-12-30 16:24:10
117.50.61.165 attackspambots
Automatic report - SSH Brute-Force Attack
2019-12-30 16:39:33
222.186.173.215 attackspambots
Dec 30 04:42:40 server sshd\[17179\]: Failed password for root from 222.186.173.215 port 12266 ssh2
Dec 30 11:24:36 server sshd\[7555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Dec 30 11:24:37 server sshd\[7555\]: Failed password for root from 222.186.173.215 port 11900 ssh2
Dec 30 11:24:40 server sshd\[7555\]: Failed password for root from 222.186.173.215 port 11900 ssh2
Dec 30 11:24:43 server sshd\[7555\]: Failed password for root from 222.186.173.215 port 11900 ssh2
...
2019-12-30 16:25:17
168.90.89.35 attackbots
Dec 30 07:28:53 venus2 sshd[3993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.89.35  user=r.r
Dec 30 07:28:55 venus2 sshd[3993]: Failed password for r.r from 168.90.89.35 port 46342 ssh2
Dec 30 07:30:16 venus2 sshd[5546]: Invalid user webadmin from 168.90.89.35


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=168.90.89.35
2019-12-30 16:04:15
89.179.71.18 attackbots
Invalid user landry from 89.179.71.18 port 46200
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.179.71.18
Failed password for invalid user landry from 89.179.71.18 port 46200 ssh2
Invalid user macabinta from 89.179.71.18 port 53790
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.179.71.18
2019-12-30 16:32:20

Recently Reported IPs

133.103.167.205 67.176.236.137 16.244.128.229 186.174.55.171
235.198.5.129 227.132.27.206 104.2.129.194 46.65.33.97
100.98.164.187 154.198.160.153 249.63.180.146 63.162.201.138
244.80.71.184 161.56.227.114 215.200.2.226 138.193.84.223
100.201.174.232 123.209.13.236 26.23.118.219 37.214.42.226