Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wildau

Region: Brandenburg

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.142.53.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25015
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.142.53.71.			IN	A

;; AUTHORITY SECTION:
.			505	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070701 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 08 08:12:47 CST 2020
;; MSG SIZE  rcvd: 116
Host info
71.53.142.80.in-addr.arpa domain name pointer p508e3547.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
71.53.142.80.in-addr.arpa	name = p508e3547.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.219.12.178 attack
postfix (unknown user, SPF fail or relay access denied)
2019-11-06 02:05:23
217.112.128.48 attackbots
Postfix RBL failed
2019-11-06 01:43:00
103.99.113.62 attackbots
2019-11-05T15:38:49.275988abusebot-5.cloudsearch.cf sshd\[27384\]: Invalid user rodger from 103.99.113.62 port 39280
2019-11-06 01:32:40
71.87.7.226 attackbotsspam
WEB_SERVER 403 Forbidden
2019-11-06 01:59:50
185.153.208.26 attack
2019-11-05 06:43:52 server sshd[62112]: Failed password for invalid user tmax from 185.153.208.26 port 37056 ssh2
2019-11-06 01:52:26
91.32.101.143 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/91.32.101.143/ 
 
 DE - 1H : (80)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : DE 
 NAME ASN : ASN3320 
 
 IP : 91.32.101.143 
 
 CIDR : 91.0.0.0/10 
 
 PREFIX COUNT : 481 
 
 UNIQUE IP COUNT : 29022208 
 
 
 ATTACKS DETECTED ASN3320 :  
  1H - 1 
  3H - 1 
  6H - 4 
 12H - 5 
 24H - 7 
 
 DateTime : 2019-11-05 15:36:50 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-06 02:09:15
37.133.170.95 attackspambots
ssh failed login
2019-11-06 02:05:45
185.195.26.111 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-06 02:12:46
188.116.186.130 attackbots
Unauthorised access (Nov  5) SRC=188.116.186.130 LEN=40 TTL=54 ID=39805 TCP DPT=23 WINDOW=12659 SYN
2019-11-06 01:58:51
46.38.144.202 attackspam
2019-11-05T18:35:12.113384mail01 postfix/smtpd[21416]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-05T18:35:38.112891mail01 postfix/smtpd[21416]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-05T18:36:02.397252mail01 postfix/smtpd[21416]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-06 01:38:21
159.65.84.164 attackspambots
Nov  5 17:40:51 v22018076622670303 sshd\[13744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.164  user=root
Nov  5 17:40:53 v22018076622670303 sshd\[13744\]: Failed password for root from 159.65.84.164 port 53266 ssh2
Nov  5 17:44:33 v22018076622670303 sshd\[13758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.164  user=root
...
2019-11-06 01:39:57
92.247.181.15 attack
WEB_SERVER 403 Forbidden
2019-11-06 01:27:22
95.180.66.254 attack
MLV GET /wp-login.php
2019-11-06 01:26:52
5.39.85.147 attackbotsspam
masscan port 80
2019-11-06 02:10:01
178.62.18.121 attackbots
Nov  5 13:15:53 HOST sshd[23023]: Failed password for invalid user xd from 178.62.18.121 port 54176 ssh2
Nov  5 13:15:53 HOST sshd[23023]: Received disconnect from 178.62.18.121: 11: Bye Bye [preauth]
Nov  5 13:25:18 HOST sshd[23187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.18.121  user=r.r
Nov  5 13:25:20 HOST sshd[23187]: Failed password for r.r from 178.62.18.121 port 39992 ssh2
Nov  5 13:25:20 HOST sshd[23187]: Received disconnect from 178.62.18.121: 11: Bye Bye [preauth]
Nov  5 13:31:32 HOST sshd[23296]: Failed password for invalid user ubnt from 178.62.18.121 port 52508 ssh2
Nov  5 13:31:32 HOST sshd[23296]: Received disconnect from 178.62.18.121: 11: Bye Bye [preauth]
Nov  5 13:37:00 HOST sshd[23387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.18.121  user=r.r
Nov  5 13:37:02 HOST sshd[23387]: Failed password for r.r from 178.62.18.121 port 36756 ssh2
Nov  5........
-------------------------------
2019-11-06 01:36:39

Recently Reported IPs

81.101.240.34 88.156.245.137 104.249.218.82 108.54.89.234
82.149.211.74 61.4.158.66 191.59.6.233 69.219.48.193
120.227.45.1 45.58.91.9 110.67.240.188 162.227.240.2
87.187.137.113 17.191.87.248 60.29.251.132 24.3.232.129
102.157.74.210 140.143.3.28 79.85.213.246 219.59.214.111