Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
80.66.76.121 attackproxy
Vulnerability Scanner
2024-04-30 13:02:34
80.66.76.130 attack
Vulnerability Scanner
2024-04-22 20:50:38
80.66.76.134 attack
Vulnerability Scanner
2024-04-21 12:55:22
80.66.76.134 attack
Vulnerability Scanner
2024-04-21 12:54:57
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '80.66.76.0 - 80.66.76.255'

% Abuse contact for '80.66.76.0 - 80.66.76.255' is 'aliev7731@mail.ru'

inetnum:        80.66.76.0 - 80.66.76.255
netname:        Nethost-net
country:        NL
admin-c:        AA44566-RIPE
tech-c:         AA44566-RIPE
abuse-c:        AA44566-RIPE
status:         ASSIGNED PA
mnt-by:         ru-avm-1-mnt
mnt-by:         nethost-mnt
created:        2020-12-28T09:03:29Z
last-modified:  2025-03-31T04:04:05Z
source:         RIPE

role:           abuse-c
address:        Moscow
abuse-mailbox:  aliev7731@mail.ru
nic-hdl:        AA44566-RIPE
mnt-by:         nethost-mnt
created:        2025-02-12T05:47:05Z
last-modified:  2026-02-21T05:23:23Z
source:         RIPE # Filtered

% Information related to '80.66.76.0/24AS213010'

route:          80.66.76.0/24
origin:         AS213010
mnt-by:         ru-avm-1-mnt
created:        2025-03-20T15:46:31Z
last-modified:  2025-03-20T15:46:31Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.66.76.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59431
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.66.76.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050700 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 18:00:49 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 105.76.66.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.76.66.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.154.92.221 attackbots
Telnet Server BruteForce Attack
2019-09-14 19:27:47
82.102.165.134 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:02:46,249 INFO [amun_request_handler] PortScan Detected on Port: 445 (82.102.165.134)
2019-09-14 19:28:12
138.99.19.243 attackspambots
RDP Brute-Force (Grieskirchen RZ1)
2019-09-14 19:18:03
121.244.90.242 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:10:08,337 INFO [amun_request_handler] PortScan Detected on Port: 445 (121.244.90.242)
2019-09-14 18:43:43
36.73.144.222 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:08:07,038 INFO [amun_request_handler] PortScan Detected on Port: 445 (36.73.144.222)
2019-09-14 19:02:15
80.250.238.7 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 04:56:41,553 INFO [amun_request_handler] PortScan Detected on Port: 445 (80.250.238.7)
2019-09-14 19:37:19
121.16.117.171 attackbots
" "
2019-09-14 19:24:26
119.148.17.18 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:04:05,557 INFO [amun_request_handler] PortScan Detected on Port: 445 (119.148.17.18)
2019-09-14 19:19:30
41.218.200.91 attackspambots
Sep 14 08:15:57 *** sshd[2358389]: refused connect from 41.218.200.91 (=
41.218.200.91)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.218.200.91
2019-09-14 18:59:24
182.71.125.106 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:55:04,584 INFO [shellcode_manager] (182.71.125.106) no match, writing hexdump (06cb1cdc794ded1faa9f8ed0bf4f6df0 :10711) - SMB (Unknown)
2019-09-14 19:36:11
51.68.138.143 attackspam
Sep 14 01:16:21 php2 sshd\[16959\]: Invalid user QWElong123 from 51.68.138.143
Sep 14 01:16:22 php2 sshd\[16959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.ip-51-68-138.eu
Sep 14 01:16:23 php2 sshd\[16959\]: Failed password for invalid user QWElong123 from 51.68.138.143 port 52108 ssh2
Sep 14 01:20:11 php2 sshd\[17301\]: Invalid user operatore from 51.68.138.143
Sep 14 01:20:11 php2 sshd\[17301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.ip-51-68-138.eu
2019-09-14 19:35:15
41.106.6.234 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:11:52,375 INFO [amun_request_handler] PortScan Detected on Port: 445 (41.106.6.234)
2019-09-14 18:31:18
80.82.77.139 attack
Port scan: Attack repeated for 24 hours
2019-09-14 19:37:55
211.174.123.131 attackspambots
Sep 14 10:57:07 MK-Soft-VM6 sshd\[21927\]: Invalid user ! from 211.174.123.131 port 23980
Sep 14 10:57:07 MK-Soft-VM6 sshd\[21927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.174.123.131
Sep 14 10:57:09 MK-Soft-VM6 sshd\[21927\]: Failed password for invalid user ! from 211.174.123.131 port 23980 ssh2
...
2019-09-14 19:31:08
112.85.42.171 attack
Sep 14 00:32:10 lcdev sshd\[21420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.171  user=root
Sep 14 00:32:11 lcdev sshd\[21420\]: Failed password for root from 112.85.42.171 port 50010 ssh2
Sep 14 00:32:27 lcdev sshd\[21441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.171  user=root
Sep 14 00:32:29 lcdev sshd\[21441\]: Failed password for root from 112.85.42.171 port 59993 ssh2
Sep 14 00:32:45 lcdev sshd\[21451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.171  user=root
2019-09-14 19:01:31

Recently Reported IPs

106.75.10.182 101.42.45.144 120.53.108.28 106.75.247.182
42.247.111.130 2606:4700:10::6814:6854 141.11.140.44 192.168.100.46
2606:4700:10::6816:54 210.58.226.105 94.34.167.110 9.252.1.141
55.232.161.205 53.239.220.70 45.135.228.212 45.135.228.0
41.164.98.50 110.78.158.61 2606:4700:10::6814:9208 2606:4700:10::ac43:2688