Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seoul

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.52.37.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.52.37.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025071702 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 18 09:06:27 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 80.37.52.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.37.52.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.67.168.0 attackspambots
[portscan] tcp/25 [smtp]
[scan/connect: 12 time(s)]
in blocklist.de:'listed [sasl]'
*(RWIN=28200)(10130956)
2020-10-13 16:19:12
91.93.170.220 attack
Automatic report - Banned IP Access
2020-10-13 16:36:33
140.143.30.217 attackspambots
Oct 13 07:45:33 dhoomketu sshd[3822867]: Failed password for invalid user tagaya from 140.143.30.217 port 36540 ssh2
Oct 13 07:50:26 dhoomketu sshd[3822974]: Invalid user sandu from 140.143.30.217 port 37814
Oct 13 07:50:26 dhoomketu sshd[3822974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.30.217 
Oct 13 07:50:26 dhoomketu sshd[3822974]: Invalid user sandu from 140.143.30.217 port 37814
Oct 13 07:50:29 dhoomketu sshd[3822974]: Failed password for invalid user sandu from 140.143.30.217 port 37814 ssh2
...
2020-10-13 16:01:00
51.195.47.79 attackspambots
kidness.family 51.195.47.79 [13/Oct/2020:10:22:25 +0200] "POST /wp-login.php HTTP/1.1" 200 6623 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
kidness.family 51.195.47.79 [13/Oct/2020:10:22:26 +0200] "POST /wp-login.php HTTP/1.1" 200 6580 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-13 16:33:08
158.181.16.127 attackspam
Unauthorized connection attempt from IP address 158.181.16.127 on Port 445(SMB)
2020-10-13 16:33:50
193.112.110.35 attackbots
Oct 13 02:59:41 roki-contabo sshd\[16615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.110.35  user=root
Oct 13 02:59:43 roki-contabo sshd\[16615\]: Failed password for root from 193.112.110.35 port 57268 ssh2
Oct 13 03:08:45 roki-contabo sshd\[16892\]: Invalid user snoopy from 193.112.110.35
Oct 13 03:08:45 roki-contabo sshd\[16892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.110.35
Oct 13 03:08:48 roki-contabo sshd\[16892\]: Failed password for invalid user snoopy from 193.112.110.35 port 39684 ssh2
...
2020-10-13 16:13:55
115.159.157.154 attackbotsspam
web-1 [ssh_2] SSH Attack
2020-10-13 16:21:41
46.163.32.30 attackbotsspam
Automatic report - Port Scan Attack
2020-10-13 16:33:30
211.109.11.227 attack
Oct 13 10:00:10 tor-proxy-06 sshd\[7127\]: Invalid user pi from 211.109.11.227 port 56778
Oct 13 10:00:10 tor-proxy-06 sshd\[7126\]: Invalid user pi from 211.109.11.227 port 56774
Oct 13 10:00:10 tor-proxy-06 sshd\[7127\]: Connection closed by 211.109.11.227 port 56778 \[preauth\]
Oct 13 10:00:10 tor-proxy-06 sshd\[7126\]: Connection closed by 211.109.11.227 port 56774 \[preauth\]
...
2020-10-13 16:07:38
167.114.3.105 attack
Automatic report BANNED IP
2020-10-13 16:29:02
112.85.42.176 attackspambots
2020-10-13T08:15:46.730218shield sshd\[23292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
2020-10-13T08:15:48.526983shield sshd\[23292\]: Failed password for root from 112.85.42.176 port 3491 ssh2
2020-10-13T08:15:51.998837shield sshd\[23292\]: Failed password for root from 112.85.42.176 port 3491 ssh2
2020-10-13T08:15:55.713074shield sshd\[23292\]: Failed password for root from 112.85.42.176 port 3491 ssh2
2020-10-13T08:15:58.813256shield sshd\[23292\]: Failed password for root from 112.85.42.176 port 3491 ssh2
2020-10-13 16:22:43
106.54.65.144 attackbots
Oct 13 09:30:35 Ubuntu-1404-trusty-64-minimal sshd\[32374\]: Invalid user sanchez from 106.54.65.144
Oct 13 09:30:35 Ubuntu-1404-trusty-64-minimal sshd\[32374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.65.144
Oct 13 09:30:38 Ubuntu-1404-trusty-64-minimal sshd\[32374\]: Failed password for invalid user sanchez from 106.54.65.144 port 43390 ssh2
Oct 13 09:37:24 Ubuntu-1404-trusty-64-minimal sshd\[7164\]: Invalid user hirabaya from 106.54.65.144
Oct 13 09:37:24 Ubuntu-1404-trusty-64-minimal sshd\[7164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.65.144
2020-10-13 16:38:52
179.6.49.223 attack
20/10/12@16:46:18: FAIL: Alarm-Network address from=179.6.49.223
20/10/12@16:46:18: FAIL: Alarm-Network address from=179.6.49.223
...
2020-10-13 16:17:24
85.209.0.253 attackbots
...
2020-10-13 16:29:24
82.193.145.123 attackbotsspam
Oct 13 07:25:15 staging sshd[24127]: Invalid user huawei from 82.193.145.123 port 44250
Oct 13 07:25:15 staging sshd[24127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.193.145.123 
Oct 13 07:25:15 staging sshd[24127]: Invalid user huawei from 82.193.145.123 port 44250
Oct 13 07:25:17 staging sshd[24127]: Failed password for invalid user huawei from 82.193.145.123 port 44250 ssh2
...
2020-10-13 16:28:11

Recently Reported IPs

36.28.150.47 101.133.155.170 3.29.100.167 163.242.18.137
52.2.25.77 144.202.19.168 123.58.209.243 77.83.240.4
10.85.200.97 183.6.114.32 164.92.220.210 200.107.112.72
49.51.180.2 192.168.2.222 17.241.75.163 38.71.113.75
172.20.87.165 172.20.87.166 10.55.138.11 43.30.28.16