Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hövelhof

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.70.181.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33721
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.70.181.8.			IN	A

;; AUTHORITY SECTION:
.			425	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020053101 1800 900 604800 86400

;; Query time: 191 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 01 10:21:21 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 8.181.70.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.181.70.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
42.113.4.28 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08050931)
2019-08-05 19:19:29
118.170.238.71 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=62200)(08050931)
2019-08-05 19:25:41
66.70.225.220 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 19:47:32
124.105.71.135 attackbots
Unauthorised access (Aug  5) SRC=124.105.71.135 LEN=44 TOS=0x08 PREC=0x20 TTL=44 ID=21442 TCP DPT=23 WINDOW=25650 SYN
2019-08-05 19:41:04
36.234.27.234 attackbots
[portscan] tcp/23 [TELNET]
[scan/connect: 2 time(s)]
*(RWIN=58085,23467)(08050931)
2019-08-05 19:50:29
190.201.4.158 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08050931)
2019-08-05 19:12:19
190.210.151.227 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 19:21:47
1.165.166.132 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=40515)(08050931)
2019-08-05 19:52:04
217.197.255.242 attackspambots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 19:10:49
103.56.76.170 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 19:44:50
119.181.0.91 attackspam
23/tcp
[2019-08-05]1pkt
2019-08-05 19:42:01
121.237.224.22 attackspambots
[portscan] tcp/22 [SSH]
*(RWIN=40714)(08050931)
2019-08-05 19:15:43
125.119.184.21 attackbotsspam
Telnet Server BruteForce Attack
2019-08-05 19:40:30
68.143.253.79 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 19:46:51
202.181.205.114 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-06-09/08-05]9pkt,1pt.(tcp)
2019-08-05 19:53:44

Recently Reported IPs

151.15.14.159 100.58.59.104 216.137.182.76 154.246.48.254
153.223.219.185 222.60.125.164 91.65.57.58 91.228.83.74
45.159.135.114 191.179.150.183 83.199.206.248 112.126.111.75
68.119.241.45 51.4.124.153 121.45.211.246 137.209.96.172
111.127.158.97 49.54.165.255 182.7.118.223 221.229.173.47