Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Poland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.54.113.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.54.113.224.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 05:33:24 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 224.113.54.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 224.113.54.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.107.90.213 attack
Tried our host z.
2020-09-11 01:20:41
210.12.215.251 attackspam
DATE:2020-09-10 09:50:49, IP:210.12.215.251, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-09-11 00:59:28
139.198.191.86 attackspambots
Sep 10 06:07:36 ns3164893 sshd[20612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.86  user=root
Sep 10 06:07:38 ns3164893 sshd[20612]: Failed password for root from 139.198.191.86 port 36404 ssh2
...
2020-09-11 01:00:39
188.170.80.53 attackspambots
Chat Spam
2020-09-11 01:41:37
51.254.205.6 attackbots
(sshd) Failed SSH login from 51.254.205.6 (FR/France/6.ip-51-254-205.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 10 10:29:46 server sshd[16617]: Failed password for root from 51.254.205.6 port 55246 ssh2
Sep 10 10:38:39 server sshd[18892]: Failed password for root from 51.254.205.6 port 53128 ssh2
Sep 10 10:43:19 server sshd[20094]: Failed password for root from 51.254.205.6 port 58742 ssh2
Sep 10 10:47:58 server sshd[21076]: Failed password for root from 51.254.205.6 port 36122 ssh2
Sep 10 10:52:19 server sshd[22233]: Failed password for root from 51.254.205.6 port 41736 ssh2
2020-09-11 00:51:24
91.134.173.100 attack
Sep 10 13:49:43 firewall sshd[17793]: Failed password for invalid user afrid from 91.134.173.100 port 48092 ssh2
Sep 10 13:53:06 firewall sshd[17870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.173.100  user=root
Sep 10 13:53:08 firewall sshd[17870]: Failed password for root from 91.134.173.100 port 53600 ssh2
...
2020-09-11 01:01:13
185.214.203.66 attackspam
Invalid user pi from 185.214.203.66 port 49536
2020-09-11 00:58:06
138.197.131.66 attackbotsspam
138.197.131.66 - - [10/Sep/2020:16:34:59 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [10/Sep/2020:16:35:01 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [10/Sep/2020:16:35:02 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-11 01:12:33
185.56.153.229 attackbots
$f2bV_matches
2020-09-11 01:12:13
212.64.17.102 attack
$f2bV_matches
2020-09-11 01:15:58
165.22.121.56 attack
SSH brutforce
2020-09-11 01:14:52
218.51.205.132 attackspambots
...
2020-09-11 01:10:51
122.51.204.45 attackspambots
Sep 10 17:46:18 kim5 sshd[15262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.204.45 
Sep 10 17:46:20 kim5 sshd[15262]: Failed password for invalid user webpop from 122.51.204.45 port 39484 ssh2
Sep 10 17:48:38 kim5 sshd[15335]: Failed password for root from 122.51.204.45 port 3082 ssh2
...
2020-09-11 01:18:20
50.47.140.203 attackspam
2020-09-10T19:16:05.640248ks3355764 sshd[2708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.47.140.203  user=root
2020-09-10T19:16:07.902439ks3355764 sshd[2708]: Failed password for root from 50.47.140.203 port 36262 ssh2
...
2020-09-11 01:18:48
191.217.170.33 attack
(sshd) Failed SSH login from 191.217.170.33 (BR/Brazil/191-217-170-33.user3p.brasiltelecom.net.br): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  9 17:53:08 optimus sshd[8353]: Invalid user jag from 191.217.170.33
Sep  9 17:53:11 optimus sshd[8353]: Failed password for invalid user jag from 191.217.170.33 port 33093 ssh2
Sep  9 17:58:01 optimus sshd[9859]: Failed password for root from 191.217.170.33 port 58016 ssh2
Sep  9 17:59:45 optimus sshd[10196]: Invalid user delmo from 191.217.170.33
Sep  9 17:59:47 optimus sshd[10196]: Failed password for invalid user delmo from 191.217.170.33 port 39469 ssh2
2020-09-11 00:49:56

Recently Reported IPs

190.53.179.248 228.249.120.239 220.251.205.43 173.211.2.161
14.242.106.177 255.255.255.1 61.61.94.18 215.234.246.88
212.84.72.12 72.38.207.3 209.68.186.57 254.83.170.111
181.176.8.121 243.131.208.151 7.62.179.142 63.162.10.130
4.147.87.48 41.139.3.132 202.163.90.217 3.112.185.250