Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.141.158.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34172
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.141.158.207.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 00:30:12 CST 2025
;; MSG SIZE  rcvd: 107
Host info
207.158.141.80.in-addr.arpa domain name pointer p508d9ecf.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.158.141.80.in-addr.arpa	name = p508d9ecf.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.35.51.23 attackbots
Sep 27 20:32:35 galaxy event: galaxy/lswi: smtp: martha.stritzel@wi.uni-potsdam.de [193.35.51.23] authentication failure using internet password
Sep 27 20:32:36 galaxy event: galaxy/lswi: smtp: martha.stritzel [193.35.51.23] authentication failure using internet password
Sep 27 20:33:08 galaxy event: galaxy/lswi: smtp: juliane.meier@wi.uni-potsdam.de [193.35.51.23] authentication failure using internet password
Sep 27 20:33:10 galaxy event: galaxy/lswi: smtp: juliane.meier [193.35.51.23] authentication failure using internet password
Sep 27 20:33:16 galaxy event: galaxy/lswi: smtp: anne-kathrin.leo@wi.uni-potsdam.de [193.35.51.23] authentication failure using internet password
...
2020-09-28 02:36:20
185.239.242.57 attackspam
k+ssh-bruteforce
2020-09-28 02:39:50
40.121.157.202 attack
Invalid user 225 from 40.121.157.202 port 53051
2020-09-28 02:40:57
176.236.121.150 attackbotsspam
Automatic report - Port Scan Attack
2020-09-28 02:57:31
89.208.240.168 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-09-28 02:26:11
52.242.84.14 attackbots
Invalid user staging from 52.242.84.14 port 38784
2020-09-28 02:29:19
113.166.92.62 attackspam
Sep 26 20:34:27 *** sshd[14283]: Did not receive identification string from 113.166.92.62
2020-09-28 02:50:28
123.103.88.252 attackbotsspam
$f2bV_matches
2020-09-28 02:47:13
40.114.84.16 attackbotsspam
Invalid user admin from 40.114.84.16 port 46456
2020-09-28 02:52:00
102.165.30.9 attackspambots
TCP port : 50070
2020-09-28 02:37:07
117.220.250.215 attackspam
Port Scan: TCP/23
2020-09-28 02:23:33
37.187.54.67 attackspambots
Invalid user sinusbot from 37.187.54.67 port 52346
2020-09-28 02:44:48
36.68.16.140 attackspambots
20/9/26@16:34:49: FAIL: Alarm-Network address from=36.68.16.140
20/9/26@16:34:50: FAIL: Alarm-Network address from=36.68.16.140
...
2020-09-28 02:34:07
112.85.42.200 attackspam
[ssh] SSH attack
2020-09-28 02:33:19
114.205.36.141 attackspambots
37215/tcp
[2020-09-27]1pkt
2020-09-28 02:28:08

Recently Reported IPs

36.29.33.15 64.157.111.6 235.72.207.53 121.213.213.105
103.49.237.67 153.63.253.33 108.110.248.119 160.140.78.211
222.140.140.184 93.130.94.47 253.68.40.243 36.204.84.91
246.80.145.249 152.128.130.240 207.34.137.110 200.171.118.203
131.5.186.178 45.61.179.126 129.226.187.114 104.140.196.204