Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hannover

Region: Niedersachsen

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.139.164.188
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61359
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.139.164.188.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031002 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 11 12:01:59 CST 2025
;; MSG SIZE  rcvd: 107
Host info
188.164.139.80.in-addr.arpa domain name pointer p508ba4bc.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
188.164.139.80.in-addr.arpa	name = p508ba4bc.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
116.108.239.112 attack
9001/tcp
[2019-10-28]1pkt
2019-10-29 02:16:41
91.178.94.21 attackspambots
SSH Scan
2019-10-29 02:08:25
174.139.156.22 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-29 01:52:33
35.188.242.129 attackbots
Oct 28 13:16:05 ny01 sshd[29046]: Failed password for root from 35.188.242.129 port 58212 ssh2
Oct 28 13:22:19 ny01 sshd[29596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.188.242.129
Oct 28 13:22:21 ny01 sshd[29596]: Failed password for invalid user qie from 35.188.242.129 port 40678 ssh2
2019-10-29 01:43:51
217.76.200.166 attack
1433/tcp
[2019-10-28]1pkt
2019-10-29 02:03:26
113.196.133.113 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-10-29 02:05:03
182.150.2.250 attackbotsspam
10/28/2019-07:48:42.950422 182.150.2.250 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-29 02:15:23
179.43.108.51 attack
23/tcp
[2019-10-28]1pkt
2019-10-29 02:00:03
27.96.137.9 attackspam
1433/tcp 1433/tcp 1433/tcp
[2019-10-28]3pkt
2019-10-29 02:05:38
114.33.236.93 attackspam
9001/tcp
[2019-10-28]1pkt
2019-10-29 02:11:01
113.5.101.178 attack
" "
2019-10-29 02:13:14
117.91.131.119 attack
Oct 28 07:48:38 esmtp postfix/smtpd[19680]: lost connection after AUTH from unknown[117.91.131.119]
Oct 28 07:48:40 esmtp postfix/smtpd[19680]: lost connection after AUTH from unknown[117.91.131.119]
Oct 28 07:48:45 esmtp postfix/smtpd[19680]: lost connection after AUTH from unknown[117.91.131.119]
Oct 28 07:48:48 esmtp postfix/smtpd[19680]: lost connection after AUTH from unknown[117.91.131.119]
Oct 28 07:48:50 esmtp postfix/smtpd[19680]: lost connection after AUTH from unknown[117.91.131.119]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.91.131.119
2019-10-29 02:09:44
42.115.223.42 attackspam
DATE:2019-10-28 15:15:06, IP:42.115.223.42, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-10-29 01:56:12
182.138.228.127 attackspam
60001/tcp
[2019-10-28]1pkt
2019-10-29 02:19:48
124.66.144.114 attackspambots
Oct 28 17:12:19 xeon sshd[58761]: Failed password for root from 124.66.144.114 port 56004 ssh2
2019-10-29 02:09:24

Recently Reported IPs

33.239.222.178 5.122.41.111 49.103.54.125 35.57.77.201
201.131.125.180 27.54.201.67 125.77.66.86 185.160.103.246
108.255.1.173 7.118.244.121 15.104.10.72 248.112.17.51
154.144.148.89 181.131.162.28 127.48.95.203 3.211.93.103
209.59.228.151 62.103.51.120 203.211.56.116 174.225.173.87