Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.203.45.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4222
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.203.45.91.			IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060300 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 03 14:35:44 CST 2020
;; MSG SIZE  rcvd: 116
Host info
91.45.203.80.in-addr.arpa domain name pointer 91.80-203-45.nextgentel.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
91.45.203.80.in-addr.arpa	name = 91.80-203-45.nextgentel.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.228.183.10 attack
Apr 17 03:50:14 vlre-nyc-1 sshd\[5910\]: Invalid user ai from 103.228.183.10
Apr 17 03:50:14 vlre-nyc-1 sshd\[5910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.183.10
Apr 17 03:50:16 vlre-nyc-1 sshd\[5910\]: Failed password for invalid user ai from 103.228.183.10 port 37348 ssh2
Apr 17 03:57:57 vlre-nyc-1 sshd\[6093\]: Invalid user admin from 103.228.183.10
Apr 17 03:57:57 vlre-nyc-1 sshd\[6093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.183.10
...
2020-04-17 13:35:54
31.167.133.137 attackspambots
DATE:2020-04-17 06:47:26, IP:31.167.133.137, PORT:ssh SSH brute force auth (docker-dc)
2020-04-17 13:01:32
139.155.22.165 attack
Invalid user dasusr from 139.155.22.165 port 55780
2020-04-17 13:32:02
188.166.208.131 attackspam
Apr 16 18:51:35 auw2 sshd\[30251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.208.131  user=root
Apr 16 18:51:37 auw2 sshd\[30251\]: Failed password for root from 188.166.208.131 port 60776 ssh2
Apr 16 18:56:07 auw2 sshd\[30732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.208.131  user=root
Apr 16 18:56:10 auw2 sshd\[30732\]: Failed password for root from 188.166.208.131 port 39506 ssh2
Apr 16 19:00:40 auw2 sshd\[31158\]: Invalid user ss from 188.166.208.131
Apr 16 19:00:40 auw2 sshd\[31158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.208.131
2020-04-17 13:06:11
103.18.248.32 attackbotsspam
Apr 16 18:49:45 eddieflores sshd\[26215\]: Invalid user mi from 103.18.248.32
Apr 16 18:49:45 eddieflores sshd\[26215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.18.248.32
Apr 16 18:49:47 eddieflores sshd\[26215\]: Failed password for invalid user mi from 103.18.248.32 port 33526 ssh2
Apr 16 18:53:21 eddieflores sshd\[26495\]: Invalid user sftpuser from 103.18.248.32
Apr 16 18:53:21 eddieflores sshd\[26495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.18.248.32
2020-04-17 13:00:21
158.69.222.2 attackspambots
SSH auth scanning - multiple failed logins
2020-04-17 13:09:34
37.59.125.163 attack
Apr 17 06:09:32 pornomens sshd\[22468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.125.163  user=root
Apr 17 06:09:35 pornomens sshd\[22468\]: Failed password for root from 37.59.125.163 port 34240 ssh2
Apr 17 06:13:38 pornomens sshd\[22539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.125.163  user=root
...
2020-04-17 13:25:04
23.100.106.135 attack
Apr 17 05:35:11 v22018086721571380 sshd[21434]: Failed password for invalid user ubuntu from 23.100.106.135 port 47040 ssh2
Apr 17 06:41:54 v22018086721571380 sshd[8114]: Failed password for invalid user test from 23.100.106.135 port 60676 ssh2
2020-04-17 13:32:34
51.178.78.154 attackbots
Unauthorized connection attempt detected from IP address 51.178.78.154 to port 465
2020-04-17 13:34:19
101.99.20.59 attack
Apr 17 07:06:41 vpn01 sshd[20751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.99.20.59
Apr 17 07:06:43 vpn01 sshd[20751]: Failed password for invalid user z from 101.99.20.59 port 54156 ssh2
...
2020-04-17 13:38:21
35.199.73.100 attackbots
Apr 17 07:40:22 pkdns2 sshd\[20243\]: Invalid user postgres from 35.199.73.100Apr 17 07:40:23 pkdns2 sshd\[20243\]: Failed password for invalid user postgres from 35.199.73.100 port 36514 ssh2Apr 17 07:44:38 pkdns2 sshd\[20370\]: Invalid user ip from 35.199.73.100Apr 17 07:44:40 pkdns2 sshd\[20370\]: Failed password for invalid user ip from 35.199.73.100 port 44044 ssh2Apr 17 07:48:56 pkdns2 sshd\[20539\]: Invalid user gq from 35.199.73.100Apr 17 07:48:59 pkdns2 sshd\[20539\]: Failed password for invalid user gq from 35.199.73.100 port 51570 ssh2
...
2020-04-17 13:05:27
198.100.146.98 attack
Apr 17 06:58:18 ourumov-web sshd\[19031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.100.146.98  user=root
Apr 17 06:58:19 ourumov-web sshd\[19031\]: Failed password for root from 198.100.146.98 port 36196 ssh2
Apr 17 07:13:19 ourumov-web sshd\[20087\]: Invalid user vv from 198.100.146.98 port 36646
...
2020-04-17 13:31:30
49.234.70.67 attackbots
$f2bV_matches
2020-04-17 13:24:45
119.47.90.197 attackspam
Invalid user zte from 119.47.90.197 port 39878
2020-04-17 13:33:32
51.68.227.98 attack
Invalid user user from 51.68.227.98 port 36932
2020-04-17 13:01:14

Recently Reported IPs

249.137.6.159 59.127.253.53 176.139.8.11 111.67.202.120
113.199.134.60 2001:bc8:47b0:c30::1 105.158.157.169 122.236.204.159
103.191.171.18 142.93.7.46 214.93.22.14 81.215.226.50
123.27.91.165 2a01:4f9:2a:104c::2 182.61.185.92 211.238.11.7
161.35.45.230 23.88.146.226 190.79.168.226 2600:100d:b006:6d9:11d2:a433:2a0a:21bd