Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.238.148.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.238.148.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 18:20:35 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 5.148.238.80.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 80.238.148.5.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
201.235.19.122 attackspambots
Nov  6 18:16:24 vps691689 sshd[7135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.235.19.122
Nov  6 18:16:25 vps691689 sshd[7135]: Failed password for invalid user 1234567 from 201.235.19.122 port 37887 ssh2
Nov  6 18:20:45 vps691689 sshd[7166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.235.19.122
...
2019-11-07 01:33:51
103.89.124.170 attackspam
2019-11-06T16:39:44.782755shield sshd\[2691\]: Invalid user ultra from 103.89.124.170 port 46878
2019-11-06T16:39:44.786839shield sshd\[2691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.124.170
2019-11-06T16:39:46.803494shield sshd\[2691\]: Failed password for invalid user ultra from 103.89.124.170 port 46878 ssh2
2019-11-06T16:43:58.719041shield sshd\[3039\]: Invalid user add from 103.89.124.170 port 55292
2019-11-06T16:43:58.723825shield sshd\[3039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.124.170
2019-11-07 01:12:14
188.151.1.233 attack
Connection by 188.151.1.233 on port: 5555 got caught by honeypot at 11/6/2019 1:38:54 PM
2019-11-07 01:35:15
94.23.25.77 attack
Nov  6 06:39:42 mockhub sshd[12716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.25.77
Nov  6 06:39:44 mockhub sshd[12716]: Failed password for invalid user ramakiri from 94.23.25.77 port 47306 ssh2
...
2019-11-07 00:55:26
140.143.16.248 attackbots
Nov  6 09:38:55 lanister sshd[19287]: Invalid user pathy from 140.143.16.248
Nov  6 09:38:55 lanister sshd[19287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.16.248
Nov  6 09:38:55 lanister sshd[19287]: Invalid user pathy from 140.143.16.248
Nov  6 09:38:57 lanister sshd[19287]: Failed password for invalid user pathy from 140.143.16.248 port 51678 ssh2
...
2019-11-07 01:28:22
183.240.157.3 attackspambots
Nov  6 05:51:10 tdfoods sshd\[16691\]: Invalid user yx from 183.240.157.3
Nov  6 05:51:10 tdfoods sshd\[16691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.240.157.3
Nov  6 05:51:12 tdfoods sshd\[16691\]: Failed password for invalid user yx from 183.240.157.3 port 48540 ssh2
Nov  6 05:56:37 tdfoods sshd\[17134\]: Invalid user anavin from 183.240.157.3
Nov  6 05:56:37 tdfoods sshd\[17134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.240.157.3
2019-11-07 01:01:53
174.103.116.243 attackspam
SSH bruteforce
2019-11-07 00:58:01
177.134.100.237 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/177.134.100.237/ 
 
 BR - 1H : (271)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN18881 
 
 IP : 177.134.100.237 
 
 CIDR : 177.134.96.0/19 
 
 PREFIX COUNT : 938 
 
 UNIQUE IP COUNT : 4233472 
 
 
 ATTACKS DETECTED ASN18881 :  
  1H - 3 
  3H - 4 
  6H - 9 
 12H - 18 
 24H - 48 
 
 DateTime : 2019-11-06 15:39:44 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 00:53:09
46.101.101.66 attackbots
Nov  6 09:47:15 server sshd\[29805\]: Invalid user applmgr from 46.101.101.66
Nov  6 09:47:15 server sshd\[29805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.101.66 
Nov  6 09:47:17 server sshd\[29805\]: Failed password for invalid user applmgr from 46.101.101.66 port 34990 ssh2
Nov  6 19:43:30 server sshd\[23144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.101.66  user=root
Nov  6 19:43:31 server sshd\[23144\]: Failed password for root from 46.101.101.66 port 40764 ssh2
...
2019-11-07 01:21:33
209.97.168.118 attackspambots
2019-11-06T15:46:48.187796lon01.zurich-datacenter.net sshd\[26190\]: Invalid user wxmsyy97945 from 209.97.168.118 port 48416
2019-11-06T15:46:48.193903lon01.zurich-datacenter.net sshd\[26190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.168.118
2019-11-06T15:46:50.316943lon01.zurich-datacenter.net sshd\[26190\]: Failed password for invalid user wxmsyy97945 from 209.97.168.118 port 48416 ssh2
2019-11-06T15:51:32.869659lon01.zurich-datacenter.net sshd\[26320\]: Invalid user GuiZhouDX from 209.97.168.118 port 59720
2019-11-06T15:51:32.876404lon01.zurich-datacenter.net sshd\[26320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.168.118
...
2019-11-07 01:29:13
51.255.168.127 attackbotsspam
Nov  6 15:26:32 mail sshd[11073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.127  user=root
Nov  6 15:26:34 mail sshd[11073]: Failed password for root from 51.255.168.127 port 46850 ssh2
Nov  6 15:39:42 mail sshd[31600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.127  user=root
Nov  6 15:39:44 mail sshd[31600]: Failed password for root from 51.255.168.127 port 48944 ssh2
...
2019-11-07 00:54:54
188.159.190.171 attack
Telnet Server BruteForce Attack
2019-11-07 01:16:42
138.68.20.158 attackspam
SSH Brute-Force reported by Fail2Ban
2019-11-07 00:53:30
190.211.141.217 attackbotsspam
2019-11-06T14:33:47.350287hub.schaetter.us sshd\[9953\]: Invalid user www from 190.211.141.217 port 22221
2019-11-06T14:33:47.360566hub.schaetter.us sshd\[9953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.141.217
2019-11-06T14:33:49.599328hub.schaetter.us sshd\[9953\]: Failed password for invalid user www from 190.211.141.217 port 22221 ssh2
2019-11-06T14:39:08.820646hub.schaetter.us sshd\[9986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.141.217  user=root
2019-11-06T14:39:10.462212hub.schaetter.us sshd\[9986\]: Failed password for root from 190.211.141.217 port 5590 ssh2
...
2019-11-07 01:10:43
80.13.85.88 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/80.13.85.88/ 
 
 FR - 1H : (42)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : FR 
 NAME ASN : ASN3215 
 
 IP : 80.13.85.88 
 
 CIDR : 80.13.0.0/16 
 
 PREFIX COUNT : 1458 
 
 UNIQUE IP COUNT : 20128512 
 
 
 ATTACKS DETECTED ASN3215 :  
  1H - 1 
  3H - 3 
  6H - 5 
 12H - 8 
 24H - 16 
 
 DateTime : 2019-11-06 15:39:44 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 00:54:29

Recently Reported IPs

51.168.27.22 231.190.165.136 239.92.65.179 165.93.52.30
245.55.18.165 163.153.161.26 171.116.62.41 199.196.153.198
98.142.25.145 25.237.78.229 62.95.132.50 205.182.24.169
52.185.227.149 201.226.91.206 254.140.142.62 251.144.91.33
131.47.109.182 229.92.45.168 60.240.148.238 147.124.104.63