Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rotenburg

Region: Niedersachsen

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.143.142.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45479
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.143.142.9.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011300 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 13 16:59:30 CST 2025
;; MSG SIZE  rcvd: 105
Host info
9.142.143.80.in-addr.arpa domain name pointer p508f8e09.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.142.143.80.in-addr.arpa	name = p508f8e09.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
217.13.222.165 attack
Unauthorized connection attempt detected from IP address 217.13.222.165 to port 80 [T]
2020-08-14 03:19:17
192.35.168.218 attack
Unauthorized connection attempt detected from IP address 192.35.168.218 to port 88 [T]
2020-08-14 03:23:05
178.168.205.85 attack
Unauthorized connection attempt detected from IP address 178.168.205.85 to port 445 [T]
2020-08-14 03:02:35
142.93.34.237 attackspam
Aug 13 20:19:06 sso sshd[17824]: Failed password for root from 142.93.34.237 port 46726 ssh2
...
2020-08-14 02:46:09
222.186.175.182 attackspam
2020-08-13T19:09:09.598890abusebot-6.cloudsearch.cf sshd[21579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2020-08-13T19:09:11.489616abusebot-6.cloudsearch.cf sshd[21579]: Failed password for root from 222.186.175.182 port 20892 ssh2
2020-08-13T19:09:14.376773abusebot-6.cloudsearch.cf sshd[21579]: Failed password for root from 222.186.175.182 port 20892 ssh2
2020-08-13T19:09:09.598890abusebot-6.cloudsearch.cf sshd[21579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2020-08-13T19:09:11.489616abusebot-6.cloudsearch.cf sshd[21579]: Failed password for root from 222.186.175.182 port 20892 ssh2
2020-08-13T19:09:14.376773abusebot-6.cloudsearch.cf sshd[21579]: Failed password for root from 222.186.175.182 port 20892 ssh2
2020-08-13T19:09:09.598890abusebot-6.cloudsearch.cf sshd[21579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 
...
2020-08-14 03:18:21
212.112.100.137 attackspambots
Unauthorized connection attempt detected from IP address 212.112.100.137 to port 21 [T]
2020-08-14 03:19:51
195.211.245.42 attackbotsspam
Unauthorized connection attempt detected from IP address 195.211.245.42 to port 23 [T]
2020-08-14 03:20:53
103.242.106.119 attack
Unauthorized connection attempt detected from IP address 103.242.106.119 to port 445 [T]
2020-08-14 02:50:40
164.52.24.178 attackspam
Unauthorized connection attempt detected from IP address 164.52.24.178 to port 2404 [T]
2020-08-14 02:44:57
80.241.212.44 attackspam
Unauthorized connection attempt detected from IP address 80.241.212.44 to port 2212 [T]
2020-08-14 03:11:47
192.35.168.201 attackspambots
Unauthorized connection attempt detected from IP address 192.35.168.201 to port 9304 [T]
2020-08-14 03:00:00
61.84.128.6 attackbotsspam
Unauthorized connection attempt detected from IP address 61.84.128.6 to port 23 [T]
2020-08-14 03:13:45
195.208.137.35 attackspam
Unauthorized connection attempt detected from IP address 195.208.137.35 to port 23 [T]
2020-08-14 02:59:06
14.162.83.138 attackbots
445/tcp
[2020-08-13]1pkt
2020-08-14 03:17:24
81.198.117.110 attack
SSH Brute Force
2020-08-14 02:52:50

Recently Reported IPs

218.53.211.144 202.22.32.91 6.140.231.204 22.230.117.96
133.171.232.242 60.59.15.208 45.119.205.30 149.228.179.12
12.9.172.106 190.55.129.166 39.68.100.208 240.190.190.169
175.79.95.110 142.4.226.207 191.197.156.137 185.20.40.100
106.54.20.72 103.162.173.29 40.104.50.231 253.208.136.47