Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.90.106.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48066
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.90.106.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 07:49:37 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 12.106.90.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.106.90.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.136.249.151 attack
(sshd) Failed SSH login from 219.136.249.151 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 29 07:53:24 server sshd[19327]: Invalid user cc from 219.136.249.151 port 47651
Sep 29 07:53:26 server sshd[19327]: Failed password for invalid user cc from 219.136.249.151 port 47651 ssh2
Sep 29 08:04:12 server sshd[22776]: Invalid user ftpuser from 219.136.249.151 port 62821
Sep 29 08:04:14 server sshd[22776]: Failed password for invalid user ftpuser from 219.136.249.151 port 62821 ssh2
Sep 29 08:08:16 server sshd[24110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.136.249.151  user=nagios
2020-09-29 20:13:41
72.221.196.150 attackbots
CMS (WordPress or Joomla) login attempt.
2020-09-29 20:04:29
72.27.224.22 attackspambots
SMTP
2020-09-29 19:55:12
106.54.65.144 attack
Invalid user dell from 106.54.65.144 port 33848
2020-09-29 19:53:36
218.89.222.16 attack
Sep 28 19:03:45 mockhub sshd[138371]: Invalid user gpadmin from 218.89.222.16 port 5512
Sep 28 19:03:47 mockhub sshd[138371]: Failed password for invalid user gpadmin from 218.89.222.16 port 5512 ssh2
Sep 28 19:07:35 mockhub sshd[138475]: Invalid user ubuntu from 218.89.222.16 port 5528
...
2020-09-29 20:09:43
122.51.201.158 attackspam
2020-09-29 09:30:58,184 fail2ban.actions        [937]: NOTICE  [sshd] Ban 122.51.201.158
2020-09-29 10:10:58,860 fail2ban.actions        [937]: NOTICE  [sshd] Ban 122.51.201.158
2020-09-29 10:44:19,799 fail2ban.actions        [937]: NOTICE  [sshd] Ban 122.51.201.158
2020-09-29 11:18:41,862 fail2ban.actions        [937]: NOTICE  [sshd] Ban 122.51.201.158
2020-09-29 11:53:30,178 fail2ban.actions        [937]: NOTICE  [sshd] Ban 122.51.201.158
...
2020-09-29 20:29:35
34.82.27.159 attackspambots
Invalid user cod4server from 34.82.27.159 port 55072
2020-09-29 20:24:27
222.186.30.112 attackspambots
Sep 29 13:45:36 abendstille sshd\[29660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Sep 29 13:45:38 abendstille sshd\[29660\]: Failed password for root from 222.186.30.112 port 50840 ssh2
Sep 29 13:45:41 abendstille sshd\[29660\]: Failed password for root from 222.186.30.112 port 50840 ssh2
Sep 29 13:45:44 abendstille sshd\[29660\]: Failed password for root from 222.186.30.112 port 50840 ssh2
Sep 29 13:45:48 abendstille sshd\[29831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
...
2020-09-29 20:00:37
165.232.47.169 attackbots
Sep 28 23:45:06 sso sshd[2047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.47.169
Sep 28 23:45:08 sso sshd[2047]: Failed password for invalid user master from 165.232.47.169 port 38214 ssh2
...
2020-09-29 20:01:26
222.73.18.8 attack
Invalid user db from 222.73.18.8 port 47968
2020-09-29 20:19:05
194.180.224.115 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-29 19:58:57
62.112.11.79 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-29T09:18:53Z and 2020-09-29T10:19:34Z
2020-09-29 19:55:38
185.217.1.246 attackspambots
Sep 29 16:50:42 itv-usvr-01 sshd[23400]: Invalid user 0 from 185.217.1.246
2020-09-29 20:10:22
65.181.123.252 attack
phishing
2020-09-29 20:11:34
134.209.35.77 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-09-29 20:18:16

Recently Reported IPs

209.212.195.254 133.121.228.92 79.171.42.78 209.146.165.124
167.46.131.27 39.210.191.158 112.166.191.167 43.71.252.162
71.170.152.99 92.219.219.228 175.52.235.10 137.115.17.215
16.134.136.169 14.111.7.172 169.94.79.20 55.158.125.65
55.84.19.116 61.67.117.186 13.195.242.33 32.21.136.119