Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Friedberg

Region: Hesse

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.147.40.151
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43747
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.147.40.151.			IN	A

;; AUTHORITY SECTION:
.			314	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070902 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 10 07:07:23 CST 2020
;; MSG SIZE  rcvd: 117
Host info
151.40.147.80.in-addr.arpa domain name pointer p50932897.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
151.40.147.80.in-addr.arpa	name = p50932897.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
150.129.8.23 attackspambots
Unauthorized connection attempt detected from IP address 150.129.8.23 to port 443
2020-08-05 18:27:33
152.136.112.251 attackbotsspam
 TCP (SYN) 152.136.112.251:45101 -> port 27672, len 44
2020-08-05 18:43:10
188.170.13.225 attackbotsspam
leo_www
2020-08-05 18:19:46
51.83.42.66 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-05 18:50:18
37.59.47.61 attackbots
37.59.47.61 - - [05/Aug/2020:11:42:23 +0100] "POST /wp-login.php HTTP/1.1" 200 6981 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.59.47.61 - - [05/Aug/2020:11:44:28 +0100] "POST /wp-login.php HTTP/1.1" 200 6981 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.59.47.61 - - [05/Aug/2020:11:45:47 +0100] "POST /wp-login.php HTTP/1.1" 200 6981 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-05 18:48:36
189.197.60.78 attack
Honeypot hit.
2020-08-05 18:28:27
95.9.192.85 attackspambots
Unauthorized connection attempt detected from IP address 95.9.192.85 to port 23
2020-08-05 18:55:20
45.184.225.2 attackbots
Aug  5 06:27:21 haigwepa sshd[3373]: Failed password for root from 45.184.225.2 port 37701 ssh2
...
2020-08-05 18:24:25
54.36.182.244 attackbots
$f2bV_matches
2020-08-05 19:00:39
177.159.99.89 attackbotsspam
$f2bV_matches
2020-08-05 18:36:23
178.176.165.177 attackbotsspam
20/8/5@01:19:42: FAIL: Alarm-Network address from=178.176.165.177
20/8/5@01:19:42: FAIL: Alarm-Network address from=178.176.165.177
...
2020-08-05 18:59:06
95.130.168.234 attackbots
$f2bV_matches
2020-08-05 18:51:53
162.210.173.6 attackbots
Icarus honeypot on github
2020-08-05 18:32:48
192.35.168.201 attackbotsspam
Unauthorized connection attempt detected from IP address 192.35.168.201 to port 22 [T]
2020-08-05 18:22:59
187.141.128.42 attackbots
Multiple SSH authentication failures from 187.141.128.42
2020-08-05 18:24:57

Recently Reported IPs

173.107.183.154 199.47.183.181 115.86.131.127 133.155.93.198
76.239.170.69 173.126.25.180 115.59.20.253 103.55.139.175
150.117.130.245 94.84.190.14 186.216.67.176 5.203.250.153
59.136.189.121 186.117.173.71 129.37.152.161 185.93.75.247
103.55.139.48 201.96.48.73 177.71.14.207 2.106.65.218