Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
185.80.54.37 attack
slow and persistent scanner
2019-11-03 06:07:47
185.80.54.34 attackspambots
slow and persistent scanner
2019-11-03 05:46:25
185.80.54.35 attackspambots
slow and persistent scanner
2019-11-03 05:23:26
185.80.54.30 attack
slow and persistent scanner
2019-11-03 05:01:00
185.80.54.216 attack
slow and persistent scanner
2019-11-02 08:06:42
185.80.54.183 attack
slow and persistent scanner
2019-11-02 06:41:23
185.80.54.153 attack
slow and persistent scanner
2019-11-02 05:41:20
185.80.54.26 attackspambots
possible SYN flooding on port 25. Sending cookies
2019-11-01 21:50:44
185.80.54.121 attackbotsspam
possible SYN flooding on port 25. Sending cookies.
2019-11-01 21:31:54
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.80.54.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;185.80.54.44.			IN	A

;; AUTHORITY SECTION:
.			85	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022081901 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 20 01:44:41 CST 2022
;; MSG SIZE  rcvd: 105
Host info
44.54.80.185.in-addr.arpa domain name pointer fly.justexplanation.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.54.80.185.in-addr.arpa	name = fly.justexplanation.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
143.59.9.18 attack
Port Scan: UDP/80
2019-09-25 08:14:08
93.179.69.53 attackspam
Attempts to deliver email spam by spoofing receiving hostname.
2019-09-25 08:28:28
64.91.233.73 attackbots
Port Scan: TCP/445
2019-09-25 08:05:09
186.88.123.106 attack
Port Scan: TCP/445
2019-09-25 08:36:30
41.79.169.158 attack
445/tcp
[2019-09-24]1pkt
2019-09-25 08:31:55
117.37.144.197 attack
Port Scan: TCP/23
2019-09-25 08:14:41
159.146.11.217 attackspambots
Port Scan: TCP/23
2019-09-25 07:57:53
50.26.202.60 attack
Port Scan: UDP/137
2019-09-25 08:20:18
160.153.156.47 attackspambots
Port Scan: TCP/443
2019-09-25 08:12:19
91.105.119.233 attackspam
Port Scan: TCP/445
2019-09-25 08:28:42
185.158.253.97 attackspambots
Port Scan: TCP/8080
2019-09-25 08:25:59
23.214.161.80 attackspam
Port Scan: TCP/47860
2019-09-25 08:32:41
188.230.211.128 attackbots
Port Scan: TCP/5555
2019-09-25 08:09:25
41.210.159.127 attack
Port Scan: TCP/445
2019-09-25 08:21:34
47.222.201.44 attack
Port Scan: UDP/500
2019-09-25 08:31:07

Recently Reported IPs

234.48.102.59 252.166.202.171 51.15.245.136 133.242.207.53
157.112.187.153 117.93.171.121 64.124.8.34 193.114.46.65
53.217.29.246 103.77.107.104 2804:18:1091:13cb:f9b6:f3eb:6251:6b69 56.217.170.130
255.26.102.186 217.196.161.121 172.104.168.180 103.43.144.113
103.43.144.153 61.152.201.136 19.212.51.224 212.247.152.98