Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.58.150.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.58.150.134.			IN	A

;; AUTHORITY SECTION:
.			458	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 00:13:22 CST 2022
;; MSG SIZE  rcvd: 106
Host info
134.150.58.80.in-addr.arpa domain name pointer 134.red-80-58-150.staticip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.150.58.80.in-addr.arpa	name = 134.red-80-58-150.staticip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
47.98.166.108 attackspam
Invalid user telma from 47.98.166.108 port 44096
2020-08-23 20:12:36
128.199.138.31 attackbotsspam
Invalid user jenkins from 128.199.138.31 port 33242
2020-08-23 20:19:24
185.132.53.150 attack
Port 22 Scan, PTR: None
2020-08-23 19:50:34
218.92.0.192 attack
Aug 23 13:25:00 sip sshd[1397786]: Failed password for root from 218.92.0.192 port 42232 ssh2
Aug 23 13:26:10 sip sshd[1397805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.192  user=root
Aug 23 13:26:12 sip sshd[1397805]: Failed password for root from 218.92.0.192 port 61719 ssh2
...
2020-08-23 20:02:22
49.235.252.236 attackspambots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-08-23 19:47:18
106.12.33.174 attackbotsspam
Invalid user lili from 106.12.33.174 port 52312
2020-08-23 19:57:24
180.76.149.15 attack
Aug 23 08:09:37 fhem-rasp sshd[25275]: Connection closed by 180.76.149.15 port 54784 [preauth]
...
2020-08-23 19:44:49
112.78.132.230 attackbots
GET /wp-login.php HTTP/1.1
2020-08-23 19:52:40
46.45.28.242 attackspambots
20/8/22@23:45:54: FAIL: Alarm-Network address from=46.45.28.242
...
2020-08-23 20:18:39
170.80.41.90 attackbotsspam
$f2bV_matches
2020-08-23 19:43:31
54.37.68.66 attackbots
Aug 23 11:33:07 mout sshd[25512]: Invalid user oracle from 54.37.68.66 port 59032
2020-08-23 20:00:40
104.45.88.60 attackspambots
Invalid user hxlong from 104.45.88.60 port 47740
2020-08-23 19:48:27
212.98.122.91 attack
2020-08-22 15:28 Unauthorized connection attempt to IMAP/POP
2020-08-23 20:09:15
95.211.213.199 attackspam
95.211.213.199 - - [23/Aug/2020:11:54:06 +0100] "POST /wp-login.php HTTP/1.1" 200 2604 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
95.211.213.199 - - [23/Aug/2020:11:54:07 +0100] "POST /wp-login.php HTTP/1.1" 200 2601 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
95.211.213.199 - - [23/Aug/2020:11:54:08 +0100] "POST /wp-login.php HTTP/1.1" 200 2601 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-23 19:50:50
46.69.50.35 attackbots
Attempts against non-existent wp-login
2020-08-23 19:55:45

Recently Reported IPs

188.81.29.234 78.85.22.193 107.152.38.92 188.0.131.163
182.53.104.135 112.46.68.170 106.51.88.172 45.55.225.1
74.72.9.135 218.21.96.128 219.157.160.241 91.232.128.34
171.224.177.228 168.232.15.26 136.233.23.244 115.99.215.165
38.64.101.146 47.97.250.142 37.73.133.152 117.194.170.244