Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: Talk Talk

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.45.54.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62783
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.45.54.51.			IN	A

;; AUTHORITY SECTION:
.			159	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011002 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 11 08:16:35 CST 2023
;; MSG SIZE  rcvd: 104
Host info
51.54.45.80.in-addr.arpa domain name pointer 80-45-54-51.static.dsl.as9105.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
51.54.45.80.in-addr.arpa	name = 80-45-54-51.static.dsl.as9105.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.0.247.33 attack
Automatic report - Port Scan Attack
2020-04-25 17:14:19
106.12.70.112 attackspambots
Port Scan
2020-04-25 17:39:56
120.52.121.86 attackspam
Port scan(s) denied
2020-04-25 17:47:36
61.154.14.234 attack
Apr 25 09:35:37 electroncash sshd[4153]: Invalid user chris from 61.154.14.234 port 54969
Apr 25 09:35:37 electroncash sshd[4153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.154.14.234 
Apr 25 09:35:37 electroncash sshd[4153]: Invalid user chris from 61.154.14.234 port 54969
Apr 25 09:35:39 electroncash sshd[4153]: Failed password for invalid user chris from 61.154.14.234 port 54969 ssh2
Apr 25 09:38:21 electroncash sshd[4874]: Invalid user mbsetupuser from 61.154.14.234 port 24398
...
2020-04-25 17:44:21
200.6.188.38 attackbotsspam
SSH bruteforce
2020-04-25 17:39:44
111.19.162.80 attackbots
Apr 25 10:14:40 jane sshd[23125]: Failed password for root from 111.19.162.80 port 43558 ssh2
...
2020-04-25 17:37:19
115.236.8.236 attack
Attempts to probe web pages for vulnerable PHP or other applications
2020-04-25 17:25:37
49.235.10.177 attackbots
SSH invalid-user multiple login attempts
2020-04-25 17:06:20
51.137.134.191 attack
Apr 25 11:08:18 vps sshd[25433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.137.134.191 
Apr 25 11:08:20 vps sshd[25433]: Failed password for invalid user Jenni from 51.137.134.191 port 59914 ssh2
Apr 25 11:18:55 vps sshd[25994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.137.134.191 
...
2020-04-25 17:30:39
157.230.61.132 attackspam
$f2bV_matches
2020-04-25 17:07:27
106.13.73.235 attack
$f2bV_matches
2020-04-25 17:28:13
14.160.39.138 attack
Dovecot Invalid User Login Attempt.
2020-04-25 17:17:29
117.159.5.113 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-04-25 17:04:11
68.187.220.146 attackbots
Apr 25 07:31:38 ws26vmsma01 sshd[144254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.187.220.146
Apr 25 07:31:41 ws26vmsma01 sshd[144254]: Failed password for invalid user bsnl from 68.187.220.146 port 35610 ssh2
...
2020-04-25 17:41:44
80.211.59.160 attack
Invalid user Chicago from 80.211.59.160 port 58784
2020-04-25 17:20:45

Recently Reported IPs

9.188.100.110 113.150.44.33 197.234.222.51 115.112.252.227
97.111.223.48 20.76.162.98 86.242.15.104 217.7.69.15
117.102.131.234 40.133.95.242 198.12.7.1 47.198.8.230
98.167.18.26 66.163.186.206 99.7.205.74 44.138.12.169
8.241.110.72 160.179.110.254 250.4.159.220 102.167.225.57