Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Bosnia and Herzegovina

Internet Service Provider: Kablovska Televizija HS d.o.o Sarajevo

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbots
Dec 22 12:11:38 debian-2gb-nbg1-2 kernel: \[665850.162326\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.80.45.20 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=17112 DF PROTO=TCP SPT=58012 DPT=81 WINDOW=14600 RES=0x00 SYN URGP=0
2019-12-22 21:22:23
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.80.45.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48666
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.80.45.20.			IN	A

;; AUTHORITY SECTION:
.			386	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122200 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 22 21:22:13 CST 2019
;; MSG SIZE  rcvd: 115
Host info
20.45.80.80.in-addr.arpa domain name pointer cable-80-80-32-20.dynamic.telemach.ba.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.45.80.80.in-addr.arpa	name = cable-80-80-32-20.dynamic.telemach.ba.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.199.198.137 attackspam
SSH Brute-Force Attack
2020-03-18 05:55:22
66.151.211.170 attackspambots
HEAD /robots.txt HTTP/1.0 403 0 "-" "-"
2020-03-18 06:15:26
27.200.134.6 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 05:51:08
222.186.175.154 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-18 06:14:22
168.62.179.117 attack
[2020-03-17 18:03:26] NOTICE[1148][C-00012db2] chan_sip.c: Call from '' (168.62.179.117:63397) to extension '90018057742041' rejected because extension not found in context 'public'.
[2020-03-17 18:03:26] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-17T18:03:26.483-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="90018057742041",SessionID="0x7fd82c530768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/168.62.179.117/63397",ACLName="no_extension_match"
[2020-03-17 18:07:40] NOTICE[1148][C-00012db3] chan_sip.c: Call from '' (168.62.179.117:49836) to extension '900018057742041' rejected because extension not found in context 'public'.
[2020-03-17 18:07:40] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-17T18:07:40.577-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="900018057742041",SessionID="0x7fd82ca712e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP
...
2020-03-18 06:07:48
103.102.64.250 attackspam
20/3/17@16:14:12: FAIL: Alarm-Network address from=103.102.64.250
20/3/17@16:14:12: FAIL: Alarm-Network address from=103.102.64.250
...
2020-03-18 06:01:56
2.139.209.78 attackspam
Invalid user lihao from 2.139.209.78 port 57982
2020-03-18 06:20:24
118.136.66.16 attackspam
Brute force attempt
2020-03-18 06:09:25
51.68.127.137 attackbots
detected by Fail2Ban
2020-03-18 06:27:32
49.88.112.113 attackbots
March 17 2020, 22:09:29 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-03-18 06:24:00
114.67.110.227 attackbots
Mar 17 23:11:14 main sshd[5589]: Failed password for invalid user nisuser1 from 114.67.110.227 port 50661 ssh2
Mar 17 23:14:24 main sshd[5642]: Failed password for invalid user sso from 114.67.110.227 port 15786 ssh2
Mar 17 23:19:08 main sshd[5735]: Failed password for invalid user sampserver from 114.67.110.227 port 50148 ssh2
Mar 17 23:20:17 main sshd[5765]: Failed password for invalid user chris from 114.67.110.227 port 58741 ssh2
Mar 17 23:26:10 main sshd[5878]: Failed password for invalid user amandabackup from 114.67.110.227 port 45191 ssh2
Mar 17 23:31:39 main sshd[5986]: Failed password for invalid user teamspeak3 from 114.67.110.227 port 31622 ssh2
Mar 17 23:34:54 main sshd[6055]: Failed password for invalid user as from 114.67.110.227 port 57382 ssh2
Mar 17 23:44:54 main sshd[6314]: Failed password for invalid user dev from 114.67.110.227 port 21670 ssh2
2020-03-18 05:50:34
123.188.19.37 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 06:00:13
81.0.212.13 attackspambots
Mar 17 18:11:55 firewall sshd[16018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.0.212.13
Mar 17 18:11:55 firewall sshd[16018]: Invalid user cpanel from 81.0.212.13
Mar 17 18:11:58 firewall sshd[16018]: Failed password for invalid user cpanel from 81.0.212.13 port 43544 ssh2
...
2020-03-18 06:13:06
202.134.185.126 attackbots
Automatic report - Port Scan Attack
2020-03-18 05:53:50
110.77.138.230 attack
Automatic report - Port Scan Attack
2020-03-18 06:03:30

Recently Reported IPs

25.44.199.95 113.5.27.222 116.2.252.189 85.209.35.32
186.79.37.129 101.75.197.221 104.136.55.214 5.196.65.135
171.241.106.82 104.254.92.42 187.162.132.190 175.5.126.116
192.125.190.181 88.132.66.26 134.170.94.23 203.68.90.154
165.30.47.238 180.29.211.105 218.137.212.70 131.19.76.10