Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lenting

Region: Bavaria

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.138.241.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47758
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.138.241.126.			IN	A

;; AUTHORITY SECTION:
.			256	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020302 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 04 12:55:08 CST 2022
;; MSG SIZE  rcvd: 107
Host info
126.241.138.80.in-addr.arpa domain name pointer p508af17e.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
126.241.138.80.in-addr.arpa	name = p508af17e.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.65.19.39 attackspambots
WordPress login Brute force / Web App Attack on client site.
2020-05-15 15:04:14
140.143.230.161 attackspambots
Invalid user ranger from 140.143.230.161 port 38668
2020-05-15 15:10:51
51.178.63.54 attackspam
Invalid user support from 51.178.63.54 port 35686
2020-05-15 14:38:51
167.172.153.199 attackbots
detected by Fail2Ban
2020-05-15 14:59:26
60.15.251.153 attackbots
CN_APNIC-HM_<177>1589514874 [1:2403396:57273] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 49 [Classification: Misc Attack] [Priority: 2]:  {TCP} 60.15.251.153:37623
2020-05-15 14:52:39
54.38.36.210 attackspam
$f2bV_matches
2020-05-15 14:34:16
24.206.39.166 attackbots
Invalid user web from 24.206.39.166 port 59502
2020-05-15 15:08:32
103.40.245.88 attackspam
May 15 07:59:52 ns382633 sshd\[14905\]: Invalid user csgo from 103.40.245.88 port 36384
May 15 07:59:52 ns382633 sshd\[14905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.40.245.88
May 15 07:59:55 ns382633 sshd\[14905\]: Failed password for invalid user csgo from 103.40.245.88 port 36384 ssh2
May 15 08:12:18 ns382633 sshd\[17273\]: Invalid user ftpuser from 103.40.245.88 port 54370
May 15 08:12:18 ns382633 sshd\[17273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.40.245.88
2020-05-15 14:47:00
45.55.210.248 attack
May 15 08:17:29 buvik sshd[22994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.210.248
May 15 08:17:31 buvik sshd[22994]: Failed password for invalid user vnc from 45.55.210.248 port 54789 ssh2
May 15 08:21:09 buvik sshd[23582]: Invalid user blower from 45.55.210.248
...
2020-05-15 14:32:35
157.245.194.35 attackbots
$f2bV_matches
2020-05-15 14:53:47
138.197.222.141 attack
ssh brute force
2020-05-15 14:26:53
88.151.139.140 attackspambots
From CCTV User Interface Log
...::ffff:88.151.139.140 - - [14/May/2020:23:54:20 +0000] "GET / HTTP/1.1" 200 960
::ffff:88.151.139.140 - - [14/May/2020:23:54:20 +0000] "GET / HTTP/1.1" 200 960
...
2020-05-15 15:07:19
2.3.74.213 attack
SSH brute-force attempt
2020-05-15 14:27:30
223.240.89.38 attackbotsspam
May 15 01:31:49 NPSTNNYC01T sshd[19554]: Failed password for root from 223.240.89.38 port 46986 ssh2
May 15 01:35:51 NPSTNNYC01T sshd[19991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.240.89.38
May 15 01:35:53 NPSTNNYC01T sshd[19991]: Failed password for invalid user dmg from 223.240.89.38 port 58888 ssh2
...
2020-05-15 14:29:22
151.80.34.219 attackbotsspam
Attempts to probe for or exploit a Drupal 7.69 site on url: /phpmyadmin/scripts/setup.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2020-05-15 15:08:09

Recently Reported IPs

246.88.52.240 86.221.172.190 4.242.31.200 20.96.221.249
91.143.53.148 229.35.65.229 51.153.162.221 141.39.9.213
110.28.6.222 83.86.83.104 155.98.207.220 175.219.7.29
142.15.222.186 44.123.145.180 207.231.26.69 147.112.7.169
125.1.126.142 148.62.105.20 239.22.78.126 13.107.192.15