Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.34.80.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46485
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;10.34.80.52.			IN	A

;; AUTHORITY SECTION:
.			405	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023111502 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 16 12:55:01 CST 2023
;; MSG SIZE  rcvd: 104
Host info
Host 52.80.34.10.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.80.34.10.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.158.22.232 attackspambots
12/31/2019-07:26:47.123575 51.158.22.232 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-31 16:36:10
221.193.253.111 attackbotsspam
21 attempts against mh-ssh on echoip.magehost.pro
2019-12-31 16:37:41
144.217.214.25 attack
Automatic report - Banned IP Access
2019-12-31 17:05:34
114.202.139.173 attack
ssh failed login
2019-12-31 16:45:13
210.22.82.255 attackbotsspam
Host Scan
2019-12-31 16:43:46
222.186.175.167 attack
$f2bV_matches
2019-12-31 16:56:17
51.38.185.121 attack
Brute force attempt
2019-12-31 16:35:03
129.204.83.118 attackspambots
$f2bV_matches
2019-12-31 17:09:05
5.23.44.246 attack
Dec 30 01:24:50 plesk sshd[22866]: Invalid user test from 5.23.44.246
Dec 30 01:24:52 plesk sshd[22866]: Failed password for invalid user test from 5.23.44.246 port 52041 ssh2
Dec 30 01:24:52 plesk sshd[22866]: Received disconnect from 5.23.44.246: 11: Bye Bye [preauth]
Dec 30 01:30:52 plesk sshd[23158]: Failed password for r.r from 5.23.44.246 port 47699 ssh2
Dec 30 01:30:52 plesk sshd[23158]: Received disconnect from 5.23.44.246: 11: Bye Bye [preauth]
Dec 30 01:31:49 plesk sshd[23197]: Invalid user host from 5.23.44.246
Dec 30 01:31:51 plesk sshd[23197]: Failed password for invalid user host from 5.23.44.246 port 17715 ssh2
Dec 30 01:31:51 plesk sshd[23197]: Received disconnect from 5.23.44.246: 11: Bye Bye [preauth]
Dec 30 01:32:57 plesk sshd[23240]: Invalid user admin from 5.23.44.246


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.23.44.246
2019-12-31 16:54:42
185.216.140.185 attackspambots
Port scan: Attack repeated for 24 hours
2019-12-31 16:50:20
122.142.133.93 attack
Automatic report - Port Scan Attack
2019-12-31 16:46:13
186.89.40.127 attack
1577773576 - 12/31/2019 07:26:16 Host: 186.89.40.127/186.89.40.127 Port: 445 TCP Blocked
2019-12-31 16:58:20
195.206.183.216 attackspambots
3389BruteforceFW23
2019-12-31 17:08:34
190.85.171.126 attackspambots
Dec 31 09:10:41 MK-Soft-VM7 sshd[21254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.171.126 
Dec 31 09:10:43 MK-Soft-VM7 sshd[21254]: Failed password for invalid user jurgen from 190.85.171.126 port 56952 ssh2
...
2019-12-31 17:01:26
27.128.234.170 attackspam
Automatic report - Banned IP Access
2019-12-31 16:39:04

Recently Reported IPs

10.33.132.198 10.33.20.171 10.33.97.91 10.32.29.249
10.32.253.44 10.33.24.136 10.35.51.7 10.32.74.71
10.32.26.120 10.34.34.22 10.32.28.250 10.32.212.49
10.38.64.172 10.36.178.245 10.32.230.79 10.32.219.199
10.34.245.157 10.33.240.74 10.36.103.105 10.35.234.108