Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: Deutsche Telekom AG

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.30.80.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46740
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;91.30.80.141.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 26 01:25:53 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 141.80.30.91.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 141.80.30.91.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.41.141 attackspambots
Jun  1 19:37:10 ns382633 sshd\[3972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.41.141  user=root
Jun  1 19:37:11 ns382633 sshd\[3972\]: Failed password for root from 178.128.41.141 port 57460 ssh2
Jun  1 19:41:33 ns382633 sshd\[4856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.41.141  user=root
Jun  1 19:41:36 ns382633 sshd\[4856\]: Failed password for root from 178.128.41.141 port 45950 ssh2
Jun  1 19:44:45 ns382633 sshd\[5119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.41.141  user=root
2020-06-02 02:56:53
41.60.12.142 attack
Unauthorized connection attempt from IP address 41.60.12.142 on Port 445(SMB)
2020-06-02 02:42:41
117.50.5.198 attack
Jun  1 05:38:11 mockhub sshd[32676]: Failed password for root from 117.50.5.198 port 51990 ssh2
...
2020-06-02 02:51:07
34.84.29.129 attackspambots
Lines containing failures of 34.84.29.129
Jun  1 13:30:47 neon sshd[6451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.84.29.129  user=r.r
Jun  1 13:30:49 neon sshd[6451]: Failed password for r.r from 34.84.29.129 port 35614 ssh2
Jun  1 13:30:50 neon sshd[6451]: Received disconnect from 34.84.29.129 port 35614:11: Bye Bye [preauth]
Jun  1 13:30:50 neon sshd[6451]: Disconnected from authenticating user r.r 34.84.29.129 port 35614 [preauth]
Jun  1 13:46:40 neon sshd[11370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.84.29.129  user=r.r
Jun  1 13:46:42 neon sshd[11370]: Failed password for r.r from 34.84.29.129 port 40386 ssh2
Jun  1 13:46:45 neon sshd[11370]: Received disconnect from 34.84.29.129 port 40386:11: Bye Bye [preauth]
Jun  1 13:46:45 neon sshd[11370]: Disconnected from authenticating user r.r 34.84.29.129 port 40386 [preauth]
Jun  1 13:52:41 neon sshd[13267]: pam_unix(........
------------------------------
2020-06-02 03:08:21
217.144.54.144 attack
Unauthorized connection attempt from IP address 217.144.54.144 on Port 445(SMB)
2020-06-02 03:01:24
106.13.15.153 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2020-06-02 02:32:48
152.0.245.22 attack
Email Spoofing
2020-06-02 02:49:22
78.160.48.3 attackbotsspam
Unauthorized connection attempt from IP address 78.160.48.3 on Port 445(SMB)
2020-06-02 02:36:55
177.42.237.157 attackspambots
Jun  1 12:38:56 m1 sshd[25529]: Failed password for r.r from 177.42.237.157 port 52822 ssh2
Jun  1 13:26:38 m1 sshd[13726]: Failed password for r.r from 177.42.237.157 port 56202 ssh2
Jun  1 13:44:19 m1 sshd[21291]: Failed password for r.r from 177.42.237.157 port 50140 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=177.42.237.157
2020-06-02 02:46:26
141.98.9.159 attack
Bruteforce detected by fail2ban
2020-06-02 02:43:32
103.145.253.10 attackbots
2020-06-01T13:40:55.168901mta02.zg01.4s-zg.intra x@x
2020-06-01T13:41:35.554359mta02.zg01.4s-zg.intra x@x
2020-06-01T13:43:12.255460mta02.zg01.4s-zg.intra x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.145.253.10
2020-06-02 02:40:37
41.216.182.145 attack
Jun  1 13:42:57 mxgate1 postfix/postscreen[25737]: CONNECT from [41.216.182.145]:17619 to [176.31.12.44]:25
Jun  1 13:42:57 mxgate1 postfix/dnsblog[25746]: addr 41.216.182.145 listed by domain zen.spamhaus.org as 127.0.0.3
Jun  1 13:43:03 mxgate1 postfix/postscreen[25737]: DNSBL rank 2 for [41.216.182.145]:17619
Jun x@x
Jun  1 13:43:07 mxgate1 postfix/postscreen[25737]: DISCONNECT [41.216.182.145]:17619


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.216.182.145
2020-06-02 02:37:39
80.227.193.178 attackbots
Port probing on unauthorized port 8089
2020-06-02 02:30:29
91.206.14.169 attackspambots
$f2bV_matches
2020-06-02 03:00:51
185.16.37.135 attackspambots
2020-06-01T18:00:14.452052randservbullet-proofcloud-66.localdomain sshd[15468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.16.37.135  user=root
2020-06-01T18:00:16.639240randservbullet-proofcloud-66.localdomain sshd[15468]: Failed password for root from 185.16.37.135 port 54156 ssh2
2020-06-01T18:08:27.408936randservbullet-proofcloud-66.localdomain sshd[15546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.16.37.135  user=root
2020-06-01T18:08:29.275036randservbullet-proofcloud-66.localdomain sshd[15546]: Failed password for root from 185.16.37.135 port 54680 ssh2
...
2020-06-02 02:40:08

Recently Reported IPs

34.86.127.47 213.204.142.188 219.140.226.104 150.253.99.192
179.91.38.140 150.83.76.36 156.184.231.7 3.178.244.164
185.81.154.237 154.250.72.15 77.142.182.212 89.253.25.14
192.11.200.94 59.117.154.252 159.148.4.227 149.41.1.76
187.255.183.32 214.159.42.21 108.252.26.134 117.136.116.86