Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bratislava

Region: Bratislava

Country: Slovakia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.80.186.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17473
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;195.80.186.14.			IN	A

;; AUTHORITY SECTION:
.			301	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020800 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 04:23:19 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 14.186.80.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.186.80.195.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.202.1.123 attack
Unauthorized connection attempt detected from IP address 185.202.1.123 to port 3389
2020-06-18 05:28:51
222.182.189.113 attack
Invalid user admin from 222.182.189.113 port 58694
2020-06-18 05:40:57
14.169.212.178 attackspam
Invalid user admin from 14.169.212.178 port 60907
2020-06-18 05:59:35
175.24.78.205 attackbots
Brute-force attempt banned
2020-06-18 05:30:17
139.59.80.88 attackbotsspam
Jun 17 20:54:27 v22019038103785759 sshd\[31660\]: Invalid user yash from 139.59.80.88 port 53476
Jun 17 20:54:27 v22019038103785759 sshd\[31660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.88
Jun 17 20:54:29 v22019038103785759 sshd\[31660\]: Failed password for invalid user yash from 139.59.80.88 port 53476 ssh2
Jun 17 20:58:31 v22019038103785759 sshd\[31917\]: Invalid user dreambox from 139.59.80.88 port 48826
Jun 17 20:58:31 v22019038103785759 sshd\[31917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.88
...
2020-06-18 05:47:10
64.64.224.54 attackspam
Invalid user hts from 64.64.224.54 port 57576
2020-06-18 05:55:07
27.128.168.225 attackbotsspam
Invalid user luciano from 27.128.168.225 port 37762
2020-06-18 05:21:42
202.148.25.150 attackbots
Failed password for invalid user realdoctor from 202.148.25.150 port 58066 ssh2
2020-06-18 05:26:49
193.122.162.184 attackbotsspam
Invalid user debian from 193.122.162.184 port 43932
2020-06-18 05:43:11
80.213.238.67 attackbotsspam
Jun 17 19:57:02 vps333114 sshd[19672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ti0003a400-0831.bb.online.no
Jun 17 19:57:04 vps333114 sshd[19672]: Failed password for invalid user ftptest from 80.213.238.67 port 43948 ssh2
...
2020-06-18 05:54:13
49.234.176.247 attackspambots
Invalid user toby from 49.234.176.247 port 33836
2020-06-18 05:19:34
101.89.63.136 attackspam
Jun 17 20:07:18 mail sshd\[20826\]: Invalid user youcef from 101.89.63.136
Jun 17 20:07:18 mail sshd\[20826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.63.136
Jun 17 20:07:20 mail sshd\[20826\]: Failed password for invalid user youcef from 101.89.63.136 port 42002 ssh2
...
2020-06-18 05:37:58
52.66.208.144 attackbots
Lines containing failures of 52.66.208.144 (max 1000)
Jun 17 13:28:58 localhost sshd[28062]: Invalid user wj from 52.66.208.144 port 51914
Jun 17 13:28:58 localhost sshd[28062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.66.208.144 
Jun 17 13:29:00 localhost sshd[28062]: Failed password for invalid user wj from 52.66.208.144 port 51914 ssh2
Jun 17 13:29:02 localhost sshd[28062]: Received disconnect from 52.66.208.144 port 51914:11: Bye Bye [preauth]
Jun 17 13:29:02 localhost sshd[28062]: Disconnected from invalid user wj 52.66.208.144 port 51914 [preauth]
Jun 17 13:40:05 localhost sshd[31027]: Invalid user rv from 52.66.208.144 port 40020
Jun 17 13:40:05 localhost sshd[31027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.66.208.144 
Jun 17 13:40:08 localhost sshd[31027]: Failed password for invalid user rv from 52.66.208.144 port 40020 ssh2
Jun 17 13:40:11 localhost sshd[31027]:........
------------------------------
2020-06-18 05:39:10
103.136.62.86 attackbotsspam
Invalid user admin from 103.136.62.86 port 51116
2020-06-18 05:52:14
176.31.69.108 attackspambots
Invalid user nifi from 176.31.69.108 port 58912
2020-06-18 05:30:02

Recently Reported IPs

177.94.117.139 85.218.0.188 142.36.15.1 95.167.225.89
164.148.135.86 64.68.231.236 131.155.81.88 177.103.120.74
117.43.71.114 177.6.116.193 132.180.23.100 27.1.117.176
54.193.63.96 78.62.111.155 71.204.66.72 139.140.123.231
117.13.216.72 163.232.5.31 98.246.44.36 31.173.241.109