Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Nigeria

Internet Service Provider: 21st Century Technologies Limited

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
SSH Brute Force, server-1 sshd[11804]: Failed password for root from 80.248.6.166 port 54174 ssh2
2019-07-01 02:08:56
Comments on same subnet:
IP Type Details Datetime
80.248.6.131 attackspam
Dec  8 15:02:39 gw1 sshd[25179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.131
Dec  8 15:02:42 gw1 sshd[25179]: Failed password for invalid user prsky from 80.248.6.131 port 34916 ssh2
...
2019-12-08 18:13:48
80.248.6.165 attack
Nov 16 21:30:11 server sshd\[11971\]: Invalid user morch from 80.248.6.165
Nov 16 21:30:11 server sshd\[11971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.165 
Nov 16 21:30:13 server sshd\[11971\]: Failed password for invalid user morch from 80.248.6.165 port 49242 ssh2
Nov 16 21:49:13 server sshd\[16412\]: Invalid user gan from 80.248.6.165
Nov 16 21:49:13 server sshd\[16412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.165 
...
2019-11-17 04:02:28
80.248.6.187 attackspambots
Sep  5 12:34:24 hanapaa sshd\[22556\]: Invalid user server from 80.248.6.187
Sep  5 12:34:24 hanapaa sshd\[22556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.187
Sep  5 12:34:26 hanapaa sshd\[22556\]: Failed password for invalid user server from 80.248.6.187 port 47016 ssh2
Sep  5 12:39:43 hanapaa sshd\[23074\]: Invalid user postgres from 80.248.6.187
Sep  5 12:39:43 hanapaa sshd\[23074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.187
2019-09-06 06:46:13
80.248.6.187 attackspambots
Sep  3 04:29:34 meumeu sshd[14673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.187 
Sep  3 04:29:36 meumeu sshd[14673]: Failed password for invalid user install from 80.248.6.187 port 57464 ssh2
Sep  3 04:35:23 meumeu sshd[15356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.187 
...
2019-09-03 10:44:03
80.248.6.153 attack
Aug 17 20:35:11 nextcloud sshd\[24710\]: Invalid user renee from 80.248.6.153
Aug 17 20:35:11 nextcloud sshd\[24710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.153
Aug 17 20:35:13 nextcloud sshd\[24710\]: Failed password for invalid user renee from 80.248.6.153 port 59466 ssh2
...
2019-08-18 02:59:49
80.248.6.174 attackbots
Aug 11 17:45:41 MK-Soft-VM7 sshd\[14333\]: Invalid user ftpuser from 80.248.6.174 port 49094
Aug 11 17:45:41 MK-Soft-VM7 sshd\[14333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.174
Aug 11 17:45:43 MK-Soft-VM7 sshd\[14333\]: Failed password for invalid user ftpuser from 80.248.6.174 port 49094 ssh2
...
2019-08-12 02:15:01
80.248.6.139 attack
Jul 31 00:14:06 web2 sshd[15711]: Failed password for mail from 80.248.6.139 port 38516 ssh2
Jul 31 00:41:48 web2 sshd[17309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.139
2019-07-31 08:25:29
80.248.6.186 attackspambots
Jul 30 08:14:41 areeb-Workstation sshd\[26747\]: Invalid user lai from 80.248.6.186
Jul 30 08:14:41 areeb-Workstation sshd\[26747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.186
Jul 30 08:14:43 areeb-Workstation sshd\[26747\]: Failed password for invalid user lai from 80.248.6.186 port 60440 ssh2
...
2019-07-30 11:55:59
80.248.6.146 attack
Jul 26 10:46:34 Ubuntu-1404-trusty-64-minimal sshd\[29974\]: Invalid user admin from 80.248.6.146
Jul 26 10:46:34 Ubuntu-1404-trusty-64-minimal sshd\[29974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.146
Jul 26 10:46:36 Ubuntu-1404-trusty-64-minimal sshd\[29974\]: Failed password for invalid user admin from 80.248.6.146 port 47444 ssh2
Jul 26 10:55:59 Ubuntu-1404-trusty-64-minimal sshd\[6070\]: Invalid user contabil from 80.248.6.146
Jul 26 10:55:59 Ubuntu-1404-trusty-64-minimal sshd\[6070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.146
2019-07-27 01:33:20
80.248.6.180 attack
Automatic report - Banned IP Access
2019-07-24 04:12:48
80.248.6.141 attackbots
Automated report - ssh fail2ban:
Jul 2 05:16:03 authentication failure 
Jul 2 05:16:05 wrong password, user=yulia, port=51808, ssh2
Jul 2 05:46:59 authentication failure
2019-07-02 18:34:29
80.248.6.148 attackspam
Unauthorized SSH login attempts
2019-07-01 17:59:01
80.248.6.186 attackbots
Jun 25 09:05:55 dedicated sshd[7194]: Invalid user pgadmin from 80.248.6.186 port 35036
2019-06-25 15:11:33
80.248.6.155 attack
2019-06-25T08:18:57.0781891240 sshd\[14456\]: Invalid user ubuntu from 80.248.6.155 port 33034
2019-06-25T08:18:57.0833721240 sshd\[14456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.155
2019-06-25T08:18:59.2339051240 sshd\[14456\]: Failed password for invalid user ubuntu from 80.248.6.155 port 33034 ssh2
...
2019-06-25 14:22:45
80.248.6.148 attack
Invalid user bbj from 80.248.6.148 port 34496
2019-06-25 13:54:06
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.248.6.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15026
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.248.6.166.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051504 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 16 07:30:22 CST 2019
;; MSG SIZE  rcvd: 116

Host info
166.6.248.80.in-addr.arpa domain name pointer mail.cloudmail.21ctl.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
166.6.248.80.in-addr.arpa	name = mail.cloudmail.21ctl.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
91.188.194.80 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-27 23:06:04
167.99.38.73 attack
SSH invalid-user multiple login try
2019-10-27 23:44:15
180.76.107.186 attack
2019-10-27T15:34:04.548368abusebot-2.cloudsearch.cf sshd\[27364\]: Invalid user appuser from 180.76.107.186 port 57890
2019-10-27 23:43:31
91.188.194.2 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-27 23:23:12
91.188.193.65 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-27 23:28:43
91.188.192.18 attackspambots
slow and persistent scanner
2019-10-27 23:45:21
211.195.117.212 attack
Oct 27 12:06:24 sshgateway sshd\[24726\]: Invalid user edvaldo from 211.195.117.212
Oct 27 12:06:24 sshgateway sshd\[24726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.117.212
Oct 27 12:06:25 sshgateway sshd\[24726\]: Failed password for invalid user edvaldo from 211.195.117.212 port 33610 ssh2
2019-10-27 23:07:32
91.188.194.28 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-27 23:19:13
91.188.194.63 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-27 23:09:04
91.188.194.19 attackbotsspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-27 23:22:11
42.112.152.21 attack
Unauthorised access (Oct 27) SRC=42.112.152.21 LEN=52 TTL=113 ID=6951 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-27 23:06:59
91.188.194.54 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-27 23:11:07
91.188.194.29 attackbotsspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-27 23:18:43
110.244.72.12 attack
Port Scan
2019-10-27 23:12:40
91.188.193.99 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-27 23:24:04

Recently Reported IPs

78.26.172.117 182.218.64.111 188.133.160.22 218.175.168.72
141.75.222.111 172.241.169.44 199.158.118.38 139.237.186.101
41.45.182.79 66.79.137.0 69.219.236.11 199.23.9.61
61.19.30.156 170.78.241.197 179.61.183.6 70.126.142.232
89.221.46.229 250.141.235.254 28.30.82.6 217.133.99.111