Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.34.168.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40130
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.34.168.80.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 07:49:27 CST 2025
;; MSG SIZE  rcvd: 105
Host info
80.168.34.91.in-addr.arpa domain name pointer p5b22a850.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.168.34.91.in-addr.arpa	name = p5b22a850.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.38.238.87 attackbotsspam
Sep  9 00:20:36 game-panel sshd[30914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.87
Sep  9 00:20:38 game-panel sshd[30914]: Failed password for invalid user tester from 51.38.238.87 port 57828 ssh2
Sep  9 00:26:06 game-panel sshd[31138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.87
2019-09-09 08:26:24
89.248.167.131 attackbots
09/08/2019-16:19:40.161898 89.248.167.131 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 100
2019-09-09 08:06:16
141.98.9.205 attack
Sep  9 01:34:10 relay postfix/smtpd\[11736\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 01:34:56 relay postfix/smtpd\[28008\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 01:35:03 relay postfix/smtpd\[18678\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 01:35:49 relay postfix/smtpd\[23002\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 01:35:57 relay postfix/smtpd\[18678\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-09 07:42:35
81.22.45.219 attackspam
09/08/2019-19:38:44.462566 81.22.45.219 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-09 08:06:38
112.114.105.22 attackbotsspam
[MonSep0902:04:01.4062442019][:error][pid16791:tid47825456035584][client112.114.105.22:2656][client112.114.105.22]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\^Mozilla/4\\\\\\\\.0\\\\\\\\\(compatible\;MSIE9.0\;WindowsNT6.1\\\\\\\\\)\$"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"430"][id"336656"][rev"2"][msg"Atomicorp.comWAFRules:FakeMSIE9./0browserMozilla/4.0\(compatible\;MSIE9.0\;WindowsNT6.1\)."][severity"CRITICAL"][hostname"www.forum-wbp.com"][uri"/type.php"][unique_id"XXWW8Y8KSA3HByFEDl4vYAAAAQI"]\,referer:http://www.forum-wbp.com//type.php\?template=tag_\(\){}\;@unlink\(FILE\)\;print_r\(xbshell\)\;assert\(\$_POST[1]\)\;{//../rss[MonSep0902:04:03.1327262019][:error][pid16791:tid47825456035584][client112.114.105.22:2656][client112.114.105.22]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\^Mozilla/4\\\\\\\\.0\\\\\\\\\(compatible\;MSIE9.0\;WindowsNT6.1\\\\\\\\\)\$"atREQUEST_HEADERS:User-Agent.[file\
2019-09-09 08:10:11
51.15.183.122 attackspam
Blocked range because of multiple attacks in the past. @ 2019-09-06T12:34:16+02:00.
2019-09-09 07:59:00
37.49.231.132 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-09-09 08:11:00
218.98.40.154 attackbotsspam
Sep  8 22:24:36 *** sshd[2592]: User root from 218.98.40.154 not allowed because not listed in AllowUsers
2019-09-09 07:59:17
115.74.251.222 attackspam
Unauthorized connection attempt from IP address 115.74.251.222 on Port 445(SMB)
2019-09-09 08:02:13
83.144.105.158 attackspambots
Sep  8 13:49:04 lcprod sshd\[2126\]: Invalid user nagios from 83.144.105.158
Sep  8 13:49:04 lcprod sshd\[2126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.beltrade.pl
Sep  8 13:49:07 lcprod sshd\[2126\]: Failed password for invalid user nagios from 83.144.105.158 port 50602 ssh2
Sep  8 13:54:38 lcprod sshd\[2639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.beltrade.pl  user=root
Sep  8 13:54:40 lcprod sshd\[2639\]: Failed password for root from 83.144.105.158 port 56002 ssh2
2019-09-09 07:55:19
157.245.4.171 attackbotsspam
Sep  8 12:44:21 wbs sshd\[26182\]: Invalid user 123abc from 157.245.4.171
Sep  8 12:44:21 wbs sshd\[26182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.4.171
Sep  8 12:44:23 wbs sshd\[26182\]: Failed password for invalid user 123abc from 157.245.4.171 port 37532 ssh2
Sep  8 12:48:10 wbs sshd\[26596\]: Invalid user useradmin from 157.245.4.171
Sep  8 12:48:10 wbs sshd\[26596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.4.171
2019-09-09 08:00:07
86.35.38.107 attackspambots
Automatic report - Port Scan Attack
2019-09-09 07:50:33
159.203.199.237 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-09 07:48:07
119.29.52.46 attackspam
2019-09-08T20:01:21.804751abusebot-7.cloudsearch.cf sshd\[27563\]: Invalid user vnc from 119.29.52.46 port 42446
2019-09-09 07:44:57
91.203.192.142 attackbotsspam
Unauthorized connection attempt from IP address 91.203.192.142 on Port 445(SMB)
2019-09-09 07:42:56

Recently Reported IPs

30.77.215.133 241.112.57.105 236.125.13.126 165.212.233.148
71.244.171.161 211.131.219.134 14.2.149.209 169.217.172.92
13.153.187.176 127.113.124.246 56.169.250.143 239.175.245.227
221.28.48.30 143.248.252.17 95.140.187.76 28.117.200.234
107.244.187.136 241.28.49.191 100.218.225.125 93.129.161.86