Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Czechia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.80.121.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1822
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.80.121.197.			IN	A

;; AUTHORITY SECTION:
.			317	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 05:09:14 CST 2024
;; MSG SIZE  rcvd: 107
Host info
197.121.80.109.in-addr.arpa domain name pointer 109-80-121-197.rcr.o2.cz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
197.121.80.109.in-addr.arpa	name = 109-80-121-197.rcr.o2.cz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.166.237.117 attackspam
Invalid user damian from 122.166.237.117 port 9395
2020-07-26 06:31:18
93.33.163.7 attack
20/7/25@11:11:39: FAIL: Alarm-Network address from=93.33.163.7
...
2020-07-26 06:00:12
122.51.19.203 attackspam
Exploited Host.
2020-07-26 06:18:13
122.51.27.99 attack
Exploited Host.
2020-07-26 06:11:30
122.225.105.173 attackbots
Exploited Host.
2020-07-26 06:30:07
136.143.146.254 attack
Port 22 Scan, PTR: None
2020-07-26 06:28:43
122.51.21.93 attack
Exploited Host.
2020-07-26 06:17:52
222.186.169.192 attack
Fail2Ban
2020-07-26 06:30:38
123.31.32.150 attack
Invalid user rrm from 123.31.32.150 port 46352
2020-07-26 06:32:43
122.51.146.36 attackspambots
Exploited Host.
2020-07-26 06:20:13
142.93.107.175 attackbotsspam
(sshd) Failed SSH login from 142.93.107.175 (DE/Germany/emrenindunyasi.google.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 25 23:27:56 grace sshd[7769]: Invalid user dick from 142.93.107.175 port 55024
Jul 25 23:27:58 grace sshd[7769]: Failed password for invalid user dick from 142.93.107.175 port 55024 ssh2
Jul 25 23:40:19 grace sshd[9630]: Invalid user zoe from 142.93.107.175 port 54304
Jul 25 23:40:21 grace sshd[9630]: Failed password for invalid user zoe from 142.93.107.175 port 54304 ssh2
Jul 25 23:46:55 grace sshd[10316]: Invalid user user from 142.93.107.175 port 40742
2020-07-26 06:20:48
123.17.248.85 attack
Exploited Host.
2020-07-26 05:59:56
101.231.135.146 attackbots
Jul 25 14:31:50 dignus sshd[24710]: Failed password for invalid user mmm from 101.231.135.146 port 53604 ssh2
Jul 25 14:36:44 dignus sshd[25325]: Invalid user lcy from 101.231.135.146 port 38272
Jul 25 14:36:44 dignus sshd[25325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.135.146
Jul 25 14:36:46 dignus sshd[25325]: Failed password for invalid user lcy from 101.231.135.146 port 38272 ssh2
Jul 25 14:41:38 dignus sshd[25924]: Invalid user icecast from 101.231.135.146 port 51186
...
2020-07-26 05:58:13
122.51.242.122 attackbotsspam
Exploited Host.
2020-07-26 06:13:03
122.51.217.131 attackspam
Exploited Host.
2020-07-26 06:15:04

Recently Reported IPs

109.79.240.170 109.79.238.226 109.79.44.224 109.8.85.198
109.8.217.28 109.79.65.24 109.8.150.159 109.8.188.103
109.80.187.237 109.79.248.252 109.79.140.114 109.79.203.231
109.79.197.25 109.82.214.25 109.8.172.66 109.79.163.63
109.79.244.135 109.80.160.170 109.79.119.212 109.79.71.91