Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Latvia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.89.72.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64959
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.89.72.122.			IN	A

;; AUTHORITY SECTION:
.			449	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 18:17:19 CST 2022
;; MSG SIZE  rcvd: 105
Host info
122.72.89.80.in-addr.arpa domain name pointer host-80-89-72-122.lmt.lv.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.72.89.80.in-addr.arpa	name = host-80-89-72-122.lmt.lv.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.32.240.39 attackspambots
Automatic report - XMLRPC Attack
2019-10-14 03:56:29
107.170.132.11 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-14 03:46:24
116.138.136.162 attackspam
Unauthorised access (Oct 13) SRC=116.138.136.162 LEN=40 TTL=49 ID=51539 TCP DPT=8080 WINDOW=39714 SYN 
Unauthorised access (Oct 13) SRC=116.138.136.162 LEN=40 TTL=49 ID=26737 TCP DPT=8080 WINDOW=46662 SYN
2019-10-14 03:54:39
45.61.175.201 attackspambots
2,90-03/03 [bc02/m44] PostRequest-Spammer scoring: zurich
2019-10-14 03:37:21
129.28.115.92 attackspambots
Sep 21 03:48:26 yesfletchmain sshd\[8178\]: Invalid user nq from 129.28.115.92 port 49161
Sep 21 03:48:26 yesfletchmain sshd\[8178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.115.92
Sep 21 03:48:28 yesfletchmain sshd\[8178\]: Failed password for invalid user nq from 129.28.115.92 port 49161 ssh2
Sep 21 03:52:33 yesfletchmain sshd\[8274\]: Invalid user test from 129.28.115.92 port 37471
Sep 21 03:52:34 yesfletchmain sshd\[8274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.115.92
...
2019-10-14 03:55:26
71.167.120.152 attackspam
Here more information about 71.167.120.152 
info: [Unhostnameed States] 701 MCI Communications Services, Inc. d/b/a Verizon Business 
rDNS: pool-71-167-120-152.nycmny.fios.verizon.net 
Connected: 2 servere(s) 
Reason: ssh 
Ports: 23 
Services: telnet 
servere: Europe/Moscow (UTC+3) 
Found at blocklist: spfbl.net, abuseIPDB.com, badips.com
myIP:89.179.244.250 
 
[2019-10-12 03:35:39] (tcp) myIP:23 <- 71.167.120.152:27082
[2019-10-12 03:35:42] (tcp) myIP:23 <- 71.167.120.152:27082


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=71.167.120.152
2019-10-14 04:03:59
42.159.10.104 attack
Oct 13 17:58:16 vps691689 sshd[3016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.10.104
Oct 13 17:58:18 vps691689 sshd[3016]: Failed password for invalid user Avignon-123 from 42.159.10.104 port 58674 ssh2
...
2019-10-14 03:37:53
112.170.78.118 attack
Mar 11 21:00:10 yesfletchmain sshd\[13814\]: User root from 112.170.78.118 not allowed because not listed in AllowUsers
Mar 11 21:00:10 yesfletchmain sshd\[13814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.78.118  user=root
Mar 11 21:00:11 yesfletchmain sshd\[13814\]: Failed password for invalid user root from 112.170.78.118 port 42992 ssh2
Mar 11 21:05:12 yesfletchmain sshd\[14542\]: Invalid user esbuser from 112.170.78.118 port 43000
Mar 11 21:05:12 yesfletchmain sshd\[14542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.78.118
...
2019-10-14 03:53:20
51.68.128.253 attackbots
2019-10-12 x@x
2019-10-12 x@x
2019-10-12 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.68.128.253
2019-10-14 03:28:14
218.234.206.107 attackbots
Oct 13 21:32:40 lcl-usvr-02 sshd[11363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.234.206.107  user=root
Oct 13 21:32:42 lcl-usvr-02 sshd[11363]: Failed password for root from 218.234.206.107 port 33942 ssh2
Oct 13 21:37:20 lcl-usvr-02 sshd[12433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.234.206.107  user=root
Oct 13 21:37:22 lcl-usvr-02 sshd[12433]: Failed password for root from 218.234.206.107 port 45692 ssh2
Oct 13 21:42:07 lcl-usvr-02 sshd[13652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.234.206.107  user=root
Oct 13 21:42:09 lcl-usvr-02 sshd[13652]: Failed password for root from 218.234.206.107 port 57454 ssh2
...
2019-10-14 03:50:25
219.107.66.18 attackbotsspam
Unauthorised access (Oct 13) SRC=219.107.66.18 LEN=40 PREC=0x20 TTL=44 ID=6915 TCP DPT=8080 WINDOW=50524 SYN 
Unauthorised access (Oct 12) SRC=219.107.66.18 LEN=40 PREC=0x20 TTL=44 ID=24911 TCP DPT=8080 WINDOW=50524 SYN 
Unauthorised access (Oct  7) SRC=219.107.66.18 LEN=40 PREC=0x20 TTL=44 ID=50708 TCP DPT=8080 WINDOW=50524 SYN
2019-10-14 03:40:53
89.252.191.61 attack
Oct  8 05:16:03 netserv300 sshd[21674]: Connection from 89.252.191.61 port 55664 on 178.63.236.21 port 22
Oct  8 05:16:03 netserv300 sshd[21675]: Connection from 89.252.191.61 port 51972 on 178.63.236.16 port 22
Oct  8 05:16:03 netserv300 sshd[21676]: Connection from 89.252.191.61 port 45132 on 178.63.236.18 port 22
Oct  8 05:16:03 netserv300 sshd[21677]: Connection from 89.252.191.61 port 50022 on 178.63.236.19 port 22
Oct  8 05:16:03 netserv300 sshd[21678]: Connection from 89.252.191.61 port 60436 on 178.63.236.17 port 22
Oct  8 05:16:03 netserv300 sshd[21679]: Connection from 89.252.191.61 port 42988 on 178.63.236.20 port 22
Oct  8 05:16:03 netserv300 sshd[21680]: Connection from 89.252.191.61 port 60376 on 178.63.236.22 port 22
Oct  8 05:19:02 netserv300 sshd[21689]: Connection from 89.252.191.61 port 48686 on 178.63.236.17 port 22
Oct  8 05:19:18 netserv300 sshd[21691]: Connection from 89.252.191.61 port 55872 on 178.63.236.18 port 22
Oct  8 05:19:19 netserv300 sshd........
------------------------------
2019-10-14 03:28:33
121.67.246.132 attack
Oct 13 19:41:13 venus sshd\[19405\]: Invalid user Automobil-123 from 121.67.246.132 port 43418
Oct 13 19:41:13 venus sshd\[19405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.67.246.132
Oct 13 19:41:15 venus sshd\[19405\]: Failed password for invalid user Automobil-123 from 121.67.246.132 port 43418 ssh2
...
2019-10-14 03:43:11
151.80.144.39 attack
Oct 13 14:46:17 SilenceServices sshd[23850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.144.39
Oct 13 14:46:19 SilenceServices sshd[23850]: Failed password for invalid user Server#2018 from 151.80.144.39 port 35746 ssh2
Oct 13 14:50:14 SilenceServices sshd[24875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.144.39
2019-10-14 03:32:31
31.207.47.77 attackspam
RDP Bruteforce
2019-10-14 03:53:44

Recently Reported IPs

80.92.206.86 80.90.81.94 80.95.15.34 80.95.45.35
80.92.224.141 80.93.254.178 80.95.80.161 80.95.67.81
80.95.95.39 80.98.95.128 80.95.95.46 80.98.16.156
80.98.163.2 81.10.26.58 81.10.26.190 81.104.134.145
81.12.100.36 81.12.124.249 81.109.251.144 81.111.37.55