Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.148.80.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37263
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.148.80.9.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 18:43:44 CST 2025
;; MSG SIZE  rcvd: 105
Host info
9.80.148.149.in-addr.arpa domain name pointer desktop-2fg7ncn.strahlen.meduniwien.ac.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.80.148.149.in-addr.arpa	name = desktop-2fg7ncn.strahlen.meduniwien.ac.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.229 attackbotsspam
k+ssh-bruteforce
2020-04-19 06:51:48
170.130.187.26 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-19 07:18:38
120.132.66.117 attack
SSH Invalid Login
2020-04-19 07:19:53
149.56.129.129 attackspam
149.56.129.129 - - [18/Apr/2020:23:38:18 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.56.129.129 - - [18/Apr/2020:23:38:19 +0200] "POST /wp-login.php HTTP/1.1" 200 6601 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.56.129.129 - - [18/Apr/2020:23:38:21 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-19 06:59:04
14.160.24.32 attackspam
Apr 18 23:24:38 h2829583 sshd[16992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.160.24.32
2020-04-19 07:06:38
106.54.189.93 attack
Invalid user admin from 106.54.189.93 port 36004
2020-04-19 07:00:58
188.17.183.1 attackspam
1587241165 - 04/18/2020 22:19:25 Host: 188.17.183.1/188.17.183.1 Port: 445 TCP Blocked
2020-04-19 06:44:53
162.243.133.109 attack
Port Scan: Events[1] countPorts[1]: 502 ..
2020-04-19 07:19:03
162.243.133.14 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-19 07:12:12
106.124.139.161 attack
Invalid user dy from 106.124.139.161 port 40372
2020-04-19 06:56:23
213.244.243.18 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-19 07:03:03
162.243.133.18 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-19 07:03:33
218.232.135.95 attack
Invalid user 0 from 218.232.135.95 port 42632
2020-04-19 06:59:21
132.232.49.143 attackbots
'Fail2Ban'
2020-04-19 07:16:03
162.243.133.185 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-04-19 07:01:38

Recently Reported IPs

7.34.153.120 188.26.178.19 91.168.106.78 132.81.127.62
198.38.65.133 3.218.21.155 30.203.167.195 87.79.161.163
81.239.155.214 207.122.44.160 127.85.173.87 90.139.211.202
121.160.125.151 17.169.199.48 89.156.208.31 189.50.234.84
16.193.205.114 184.246.123.70 104.169.216.170 215.136.93.180