Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Poland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.54.67.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47488
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.54.67.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:45:14 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 16.67.54.80.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 80.54.67.16.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
217.125.110.139 attackbotsspam
SSH Bruteforce
2019-10-25 02:30:48
3.19.185.103 attackspam
Invalid user test from 3.19.185.103 port 57524
2019-10-25 03:11:39
152.136.102.131 attack
Invalid user anthony from 152.136.102.131 port 55776
2019-10-25 02:46:14
209.205.217.210 attack
Invalid user ubuntu from 209.205.217.210 port 56204
2019-10-25 02:32:37
79.58.50.145 attack
Invalid user user from 79.58.50.145 port 59456
2019-10-25 03:00:53
140.143.2.228 attackspambots
2019-10-24T18:19:09.344337abusebot-8.cloudsearch.cf sshd\[31358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.2.228  user=root
2019-10-25 02:48:03
99.108.141.4 attackbots
2019-10-24T06:20:26.1878831495-001 sshd\[59227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99-108-141-4.lightspeed.sntcca.sbcglobal.net  user=root
2019-10-24T06:20:28.8444361495-001 sshd\[59227\]: Failed password for root from 99.108.141.4 port 38732 ssh2
2019-10-24T06:40:30.2845151495-001 sshd\[60000\]: Invalid user team from 99.108.141.4 port 50312
2019-10-24T06:40:30.2875631495-001 sshd\[60000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99-108-141-4.lightspeed.sntcca.sbcglobal.net
2019-10-24T06:40:32.5515131495-001 sshd\[60000\]: Failed password for invalid user team from 99.108.141.4 port 50312 ssh2
2019-10-24T06:44:39.5983391495-001 sshd\[60155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99-108-141-4.lightspeed.sntcca.sbcglobal.net  user=root
2019-10-24T06:44:41.6805701495-001 sshd\[60155\]: Failed password for root from 99.108.141.4
...
2019-10-25 02:57:41
132.232.112.25 attackbotsspam
$f2bV_matches
2019-10-25 02:49:05
139.199.248.153 attackbotsspam
Oct 24 17:46:09 cp sshd[20953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.153
2019-10-25 02:48:36
218.2.198.54 attackbotsspam
Invalid user ubuntu from 218.2.198.54 port 47895
2019-10-25 03:13:35
46.127.9.168 attackbotsspam
Invalid user www from 46.127.9.168 port 42670
2019-10-25 03:04:01
34.97.189.128 attack
Invalid user support from 34.97.189.128 port 55144
2019-10-25 03:09:20
202.163.126.134 attack
Invalid user temp from 202.163.126.134 port 40914
2019-10-25 03:14:38
41.226.248.221 attackspambots
Invalid user www from 41.226.248.221 port 25760
2019-10-25 03:06:38
40.79.19.138 attackbotsspam
Invalid user d from 40.79.19.138 port 47072
2019-10-25 03:07:26

Recently Reported IPs

203.172.176.0 147.51.131.68 223.64.15.247 100.182.189.115
97.95.11.167 184.43.83.24 71.229.197.138 41.180.230.35
177.165.195.6 118.231.149.127 221.235.163.27 195.21.139.14
20.169.57.197 217.70.168.92 244.223.145.230 180.69.100.4
170.7.177.7 37.164.85.160 175.45.242.151 68.37.98.234