Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.148.30.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.148.30.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:08:19 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 5.30.148.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.30.148.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.55.19.115 attackspam
Jan 14 01:35:39 server sshd\[8831\]: Failed password for invalid user qhsupport from 122.55.19.115 port 51227 ssh2
Jan 14 16:03:45 server sshd\[5081\]: Invalid user administrator from 122.55.19.115
Jan 14 16:03:45 server sshd\[5081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=nkym.com.ph 
Jan 14 16:03:48 server sshd\[5081\]: Failed password for invalid user administrator from 122.55.19.115 port 48399 ssh2
Jan 14 16:05:03 server sshd\[5285\]: Invalid user qhsupport from 122.55.19.115
Jan 14 16:05:03 server sshd\[5285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=nkym.com.ph 
...
2020-01-14 21:25:47
110.53.234.187 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-01-14 22:08:05
104.218.48.106 attackbotsspam
this ip attack my router.
2020-01-14 21:51:47
165.227.80.114 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-14 21:59:09
118.163.45.178 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-14 21:36:58
188.166.68.8 attackbots
2020-01-14T13:33:56.701445shield sshd\[11806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.68.8  user=root
2020-01-14T13:33:59.138029shield sshd\[11806\]: Failed password for root from 188.166.68.8 port 42154 ssh2
2020-01-14T13:37:21.485725shield sshd\[13048\]: Invalid user kelvin from 188.166.68.8 port 44974
2020-01-14T13:37:21.491851shield sshd\[13048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.68.8
2020-01-14T13:37:23.075458shield sshd\[13048\]: Failed password for invalid user kelvin from 188.166.68.8 port 44974 ssh2
2020-01-14 21:52:29
118.143.214.116 attack
Jan 14 14:45:54 lnxded63 sshd[9804]: Failed password for root from 118.143.214.116 port 2531 ssh2
Jan 14 14:48:31 lnxded63 sshd[9957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.143.214.116
Jan 14 14:48:33 lnxded63 sshd[9957]: Failed password for invalid user gast from 118.143.214.116 port 21532 ssh2
2020-01-14 21:54:39
118.190.104.31 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-14 21:26:13
154.66.25.163 attack
1579007101 - 01/14/2020 14:05:01 Host: 154.66.25.163/154.66.25.163 Port: 445 TCP Blocked
2020-01-14 21:28:13
37.187.44.143 attackbots
Jan 14 10:01:54 firewall sshd[3017]: Invalid user bull from 37.187.44.143
Jan 14 10:01:56 firewall sshd[3017]: Failed password for invalid user bull from 37.187.44.143 port 34044 ssh2
Jan 14 10:04:39 firewall sshd[3074]: Invalid user alex from 37.187.44.143
...
2020-01-14 21:49:49
115.159.3.221 attackbotsspam
Jan 14 14:04:20 vmanager6029 sshd\[5412\]: Invalid user monitor from 115.159.3.221 port 44314
Jan 14 14:04:20 vmanager6029 sshd\[5412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.3.221
Jan 14 14:04:22 vmanager6029 sshd\[5412\]: Failed password for invalid user monitor from 115.159.3.221 port 44314 ssh2
2020-01-14 22:06:25
218.92.0.184 attack
Jan 14 14:09:52 server sshd[19388]: Failed none for root from 218.92.0.184 port 57984 ssh2
Jan 14 14:09:57 server sshd[19388]: Failed password for root from 218.92.0.184 port 57984 ssh2
Jan 14 14:10:01 server sshd[19388]: Failed password for root from 218.92.0.184 port 57984 ssh2
2020-01-14 21:21:25
218.92.0.148 attackbots
Jan 14 08:36:17 linuxvps sshd\[19717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Jan 14 08:36:19 linuxvps sshd\[19717\]: Failed password for root from 218.92.0.148 port 25911 ssh2
Jan 14 08:36:37 linuxvps sshd\[20007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Jan 14 08:36:39 linuxvps sshd\[20007\]: Failed password for root from 218.92.0.148 port 58778 ssh2
Jan 14 08:37:11 linuxvps sshd\[20351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
2020-01-14 21:40:42
110.53.234.220 attack
ICMP MH Probe, Scan /Distributed -
2020-01-14 21:50:47
51.15.41.227 attackspambots
Unauthorized connection attempt detected from IP address 51.15.41.227 to port 2220 [J]
2020-01-14 22:00:36

Recently Reported IPs

80.37.86.108 56.39.43.69 168.13.29.250 252.85.121.78
218.22.163.128 60.82.78.220 169.237.146.244 39.216.237.253
188.56.56.226 4.168.14.135 114.114.234.168 83.83.208.38
217.72.63.0 56.97.113.103 155.140.55.152 38.88.125.141
192.88.126.143 54.124.97.198 223.66.254.54 127.131.241.2