Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pingdingshan

Region: Henan

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.194.34.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42846
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.194.34.80.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 03:33:29 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 80.34.194.1.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 1.194.34.80.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
194.61.24.172 attack
Attempted connection to port 22.
2020-09-06 19:55:23
149.129.43.198 attackspam
TCP ports : 1446 / 7974 / 14042 / 21286 / 27566
2020-09-06 20:27:49
62.173.154.220 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: www.bgf.vt.
2020-09-06 20:06:33
103.205.180.57 attack
 TCP (SYN) 103.205.180.57:45205 -> port 1433, len 44
2020-09-06 19:52:56
124.192.225.177 attack
Sep  6 10:40:00 h2646465 sshd[5130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.192.225.177  user=root
Sep  6 10:40:02 h2646465 sshd[5130]: Failed password for root from 124.192.225.177 port 13651 ssh2
Sep  6 10:42:12 h2646465 sshd[5780]: Invalid user takazawa from 124.192.225.177
Sep  6 10:42:12 h2646465 sshd[5780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.192.225.177
Sep  6 10:42:12 h2646465 sshd[5780]: Invalid user takazawa from 124.192.225.177
Sep  6 10:42:14 h2646465 sshd[5780]: Failed password for invalid user takazawa from 124.192.225.177 port 54802 ssh2
Sep  6 10:43:23 h2646465 sshd[5853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.192.225.177  user=root
Sep  6 10:43:25 h2646465 sshd[5853]: Failed password for root from 124.192.225.177 port 39396 ssh2
Sep  6 10:44:33 h2646465 sshd[5940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t
2020-09-06 19:58:58
115.73.222.40 attackbots
Port probing on unauthorized port 445
2020-09-06 20:24:00
213.59.135.87 attackspam
Sep  6 07:29:07 sshgateway sshd\[14036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.135.87  user=root
Sep  6 07:29:10 sshgateway sshd\[14036\]: Failed password for root from 213.59.135.87 port 44624 ssh2
Sep  6 07:30:37 sshgateway sshd\[14570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.135.87  user=root
2020-09-06 19:48:05
221.194.137.28 attack
Sep  6 12:09:33 ns382633 sshd\[32507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.194.137.28  user=root
Sep  6 12:09:35 ns382633 sshd\[32507\]: Failed password for root from 221.194.137.28 port 36958 ssh2
Sep  6 12:23:43 ns382633 sshd\[2563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.194.137.28  user=root
Sep  6 12:23:45 ns382633 sshd\[2563\]: Failed password for root from 221.194.137.28 port 44664 ssh2
Sep  6 12:29:36 ns382633 sshd\[3519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.194.137.28  user=root
2020-09-06 20:23:39
222.186.180.223 attack
Sep  6 05:17:34 dignus sshd[10713]: Failed password for root from 222.186.180.223 port 48484 ssh2
Sep  6 05:17:37 dignus sshd[10713]: Failed password for root from 222.186.180.223 port 48484 ssh2
Sep  6 05:17:40 dignus sshd[10713]: Failed password for root from 222.186.180.223 port 48484 ssh2
Sep  6 05:17:43 dignus sshd[10713]: Failed password for root from 222.186.180.223 port 48484 ssh2
Sep  6 05:17:47 dignus sshd[10713]: Failed password for root from 222.186.180.223 port 48484 ssh2
...
2020-09-06 20:23:17
190.198.248.245 attackbotsspam
Unauthorised access (Sep  5) SRC=190.198.248.245 LEN=52 TTL=50 ID=28779 DF TCP DPT=445 WINDOW=8192 CWR ECE SYN
2020-09-06 20:14:05
91.229.112.12 attackbots
222/tcp 3003/tcp 5000/tcp...
[2020-09-04/06]143pkt,107pt.(tcp)
2020-09-06 19:53:46
103.225.244.58 attackbotsspam
Telnet Honeypot -> Telnet Bruteforce / Login
2020-09-06 19:54:38
140.86.12.31 attack
(sshd) Failed SSH login from 140.86.12.31 (NL/Netherlands/oc-140-86-12-31.compute.oraclecloud.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  6 06:40:02 server sshd[29492]: Failed password for root from 140.86.12.31 port 32943 ssh2
Sep  6 06:54:48 server sshd[2011]: Failed password for root from 140.86.12.31 port 9721 ssh2
Sep  6 07:02:34 server sshd[4498]: Failed password for root from 140.86.12.31 port 13541 ssh2
Sep  6 07:10:33 server sshd[6947]: Failed password for root from 140.86.12.31 port 17309 ssh2
Sep  6 07:18:15 server sshd[9354]: Invalid user tunnel from 140.86.12.31 port 21150
2020-09-06 20:25:46
109.162.248.175 attackspambots
Unauthorized IMAP connection attempt
2020-09-06 20:21:26
23.92.17.246 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: li641-246.members.linode.com.
2020-09-06 20:05:19

Recently Reported IPs

1.194.197.18 1.194.9.10 1.194.235.142 1.194.231.6
1.194.198.195 1.194.217.43 1.194.178.57 1.194.30.161
1.194.179.128 1.194.181.88 1.194.149.100 1.194.158.116
1.194.134.76 1.194.137.74 1.194.136.48 1.194.210.172
1.194.10.225 1.194.114.65 1.193.94.123 1.193.89.16