Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.148.84.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64069
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.148.84.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 15:01:35 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 20.84.148.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.84.148.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.101.242.117 attackspam
Jun 28 17:06:05 tuxlinux sshd[59495]: Invalid user hl from 46.101.242.117 port 38676
Jun 28 17:06:05 tuxlinux sshd[59495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.242.117 
Jun 28 17:06:05 tuxlinux sshd[59495]: Invalid user hl from 46.101.242.117 port 38676
Jun 28 17:06:05 tuxlinux sshd[59495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.242.117 
Jun 28 17:06:05 tuxlinux sshd[59495]: Invalid user hl from 46.101.242.117 port 38676
Jun 28 17:06:05 tuxlinux sshd[59495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.242.117 
Jun 28 17:06:06 tuxlinux sshd[59495]: Failed password for invalid user hl from 46.101.242.117 port 38676 ssh2
...
2019-06-29 06:09:15
187.87.4.14 attack
SMTP-sasl brute force
...
2019-06-29 06:09:43
141.98.80.54 attackbotsspam
'IP reached maximum auth failures for a one day block'
2019-06-29 05:44:56
201.91.132.170 attackbots
ssh failed login
2019-06-29 05:38:05
112.85.42.185 attackspambots
Jun 28 21:53:56 MK-Soft-VM5 sshd\[18719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.185  user=root
Jun 28 21:53:58 MK-Soft-VM5 sshd\[18719\]: Failed password for root from 112.85.42.185 port 35925 ssh2
Jun 28 21:54:01 MK-Soft-VM5 sshd\[18719\]: Failed password for root from 112.85.42.185 port 35925 ssh2
...
2019-06-29 06:02:45
54.218.162.133 attackbotsspam
Go-http-client/1.1
2019-06-29 05:56:07
162.243.4.134 attackspam
Jun 28 15:37:18 nextcloud sshd\[16600\]: Invalid user sang from 162.243.4.134
Jun 28 15:37:18 nextcloud sshd\[16600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.4.134
Jun 28 15:37:19 nextcloud sshd\[16600\]: Failed password for invalid user sang from 162.243.4.134 port 32794 ssh2
...
2019-06-29 05:35:43
177.19.181.10 attackbotsspam
$f2bV_matches
2019-06-29 05:47:55
188.254.254.5 attack
Jun 28 20:37:13 lnxweb62 sshd[25007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.254.5
Jun 28 20:37:13 lnxweb62 sshd[25007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.254.5
2019-06-29 05:47:30
213.238.223.27 attack
Jun 28 07:45:20 dropbear[32467]: Login attempt for nonexistent user from 213.238.223.27:43866
Jun 28 07:45:20 dropbear[32467]: Login attempt for nonexistent user from 213.238.223.27:43866
Jun 28 07:45:21 dropbear[32467]: Login attempt for nonexistent user from 213.238.223.27:43866
2019-06-29 06:01:13
167.99.200.84 attack
Invalid user admin from 167.99.200.84 port 34042
2019-06-29 05:51:45
219.141.176.186 attackbotsspam
Jun 28 23:09:46 icinga sshd[18731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.141.176.186
Jun 28 23:09:47 icinga sshd[18731]: Failed password for invalid user test from 219.141.176.186 port 42878 ssh2
...
2019-06-29 06:05:55
170.245.128.100 attack
3389BruteforceFW21
2019-06-29 06:05:20
192.99.57.193 attack
$f2bV_matches
2019-06-29 06:01:44
107.213.136.221 attackspam
Jun 28 20:35:05 **** sshd[32372]: Invalid user zimbra from 107.213.136.221 port 59574
2019-06-29 05:56:40

Recently Reported IPs

115.155.50.81 174.239.216.156 127.42.142.94 225.33.137.225
25.218.252.194 160.206.5.68 124.98.214.20 73.210.68.254
223.252.108.106 166.175.70.52 116.230.82.7 234.133.237.108
151.129.176.155 241.211.2.254 184.33.207.218 118.112.97.238
247.107.230.116 55.14.198.114 117.244.254.255 71.72.228.45