Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.3.45.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.3.45.189.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 01:50:56 CST 2025
;; MSG SIZE  rcvd: 104
Host info
189.45.3.80.in-addr.arpa domain name pointer cpc96758-rdng27-2-0-cust1468.15-3.cable.virginm.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.45.3.80.in-addr.arpa	name = cpc96758-rdng27-2-0-cust1468.15-3.cable.virginm.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.52.39 attack
SSH login attempts
2020-04-15 03:36:00
52.114.144.158 attack
hack
2020-04-15 04:11:37
106.54.48.238 attack
Unauthorized connection attempt detected from IP address 106.54.48.238 to port 9768 [T]
2020-04-15 03:58:24
222.186.15.158 attackbotsspam
04/14/2020-15:34:08.078566 222.186.15.158 Protocol: 6 ET SCAN Potential SSH Scan
2020-04-15 03:38:07
119.61.0.141 attackspam
Unauthorized connection attempt detected from IP address 119.61.0.141 to port 113 [T]
2020-04-15 03:55:24
94.102.51.117 attackbots
Unauthorized connection attempt detected from IP address 94.102.51.117 to port 5900 [T]
2020-04-15 03:59:50
122.227.183.126 attackbotsspam
Unauthorized connection attempt detected from IP address 122.227.183.126 to port 1433 [T]
2020-04-15 03:52:32
123.157.138.135 attack
Unauthorized connection attempt detected from IP address 123.157.138.135 to port 1433 [T]
2020-04-15 03:51:43
129.204.106.181 attackspambots
Unauthorized connection attempt detected from IP address 129.204.106.181 to port 6380 [T]
2020-04-15 03:49:23
1.209.72.151 attack
Unauthorized connection attempt detected from IP address 1.209.72.151 to port 4567 [T]
2020-04-15 04:09:44
178.74.102.241 attackbots
Unauthorized connection attempt detected from IP address 178.74.102.241 to port 23 [T]
2020-04-15 03:46:42
194.1.243.25 attack
Unauthorized connection attempt detected from IP address 194.1.243.25 to port 23 [T]
2020-04-15 03:43:02
46.191.232.172 attackbots
Unauthorized connection attempt detected from IP address 46.191.232.172 to port 80 [T]
2020-04-15 04:04:11
211.140.118.18 attackspam
Unauthorized connection attempt detected from IP address 211.140.118.18 to port 1433 [T]
2020-04-15 03:41:42
34.76.78.209 attackspam
Unauthorized connection attempt detected from IP address 34.76.78.209 to port 2480 [T]
2020-04-15 04:08:07

Recently Reported IPs

13.8.149.146 80.40.104.24 59.126.147.137 3.45.60.19
201.197.14.177 59.131.65.124 24.113.140.32 27.17.109.145
61.203.159.149 201.147.224.136 187.187.194.205 109.187.137.181
19.103.158.1 233.109.119.158 32.129.147.124 229.177.109.103
116.130.127.108 34.29.158.174 131.129.201.202 119.61.131.247