Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.2.48.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10131
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.2.48.123.			IN	A

;; AUTHORITY SECTION:
.			378	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 14:46:32 CST 2022
;; MSG SIZE  rcvd: 104
Host info
123.48.2.80.in-addr.arpa domain name pointer cpc95606-seac27-2-0-cust122.7-2.cable.virginm.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
123.48.2.80.in-addr.arpa	name = cpc95606-seac27-2-0-cust122.7-2.cable.virginm.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.66.233.61 attackbotsspam
185.66.233.61 - - [31/Aug/2020:12:46:03 +0200] "GET /wp-login.php HTTP/1.1" 200 8691 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.66.233.61 - - [31/Aug/2020:12:46:04 +0200] "POST /wp-login.php HTTP/1.1" 200 8921 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.66.233.61 - - [31/Aug/2020:12:46:04 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-31 19:03:36
187.189.11.49 attackbotsspam
Invalid user admin from 187.189.11.49 port 34528
2020-08-31 19:19:27
125.64.94.131 attack
firewall-block, port(s): 5280/tcp
2020-08-31 19:11:59
141.98.9.35 attackbotsspam
" "
2020-08-31 18:54:27
41.93.32.88 attack
Invalid user zmy from 41.93.32.88 port 44852
2020-08-31 18:47:32
121.55.240.208 attackbots
Port probing on unauthorized port 5555
2020-08-31 18:42:59
81.68.69.42 attackspam
Port Scan detected!
...
2020-08-31 19:01:28
49.236.203.163 attackspambots
Invalid user bvm from 49.236.203.163 port 41076
2020-08-31 18:49:09
167.86.122.102 attack
Aug 31 03:54:27 dignus sshd[16083]: Failed password for invalid user wwwroot from 167.86.122.102 port 54708 ssh2
Aug 31 03:57:47 dignus sshd[16526]: Invalid user user5 from 167.86.122.102 port 59414
Aug 31 03:57:47 dignus sshd[16526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.122.102
Aug 31 03:57:48 dignus sshd[16526]: Failed password for invalid user user5 from 167.86.122.102 port 59414 ssh2
Aug 31 04:00:59 dignus sshd[16942]: Invalid user alex from 167.86.122.102 port 35884
...
2020-08-31 19:14:51
85.209.0.252 attackspambots
TCP port : 22
2020-08-31 18:48:19
121.201.76.119 attack
Invalid user sjen from 121.201.76.119 port 43618
2020-08-31 19:16:02
141.98.9.32 attackspambots
" "
2020-08-31 19:01:51
192.144.137.82 attackspambots
Invalid user user from 192.144.137.82 port 33454
2020-08-31 19:04:34
187.162.120.141 attackbotsspam
Automatic report - Port Scan Attack
2020-08-31 19:07:55
120.92.114.71 attack
120.92.114.71 (CN/China/-), 7 distributed sshd attacks on account [oracle] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Aug 31 01:20:25 server2 sshd[32747]: Invalid user oracle from 165.22.226.170
Aug 31 01:20:26 server2 sshd[32747]: Failed password for invalid user oracle from 165.22.226.170 port 44744 ssh2
Aug 31 01:18:33 server2 sshd[31304]: Failed password for invalid user oracle from 109.205.45.246 port 44806 ssh2
Aug 31 01:56:25 server2 sshd[29298]: Invalid user oracle from 120.92.114.71
Aug 31 01:53:17 server2 sshd[26670]: Failed password for invalid user oracle from 159.65.224.137 port 38344 ssh2
Aug 31 01:18:32 server2 sshd[31304]: Invalid user oracle from 109.205.45.246
Aug 31 01:53:15 server2 sshd[26670]: Invalid user oracle from 159.65.224.137

IP Addresses Blocked:

165.22.226.170 (CA/Canada/-)
109.205.45.246 (GE/Georgia/-)
2020-08-31 18:57:36

Recently Reported IPs

157.119.249.61 218.89.233.179 103.100.213.166 190.146.224.172
218.95.42.216 82.28.197.25 43.252.158.254 43.129.236.111
58.234.248.206 117.248.54.193 179.185.241.4 218.17.188.144
143.208.137.97 36.248.88.63 144.76.73.122 210.90.176.129
117.3.216.233 180.162.174.253 58.56.144.98 121.40.77.82