Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Risskov

Region: Central Jutland

Country: Denmark

Internet Service Provider: TDC A/S

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.106.80.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57387
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.106.80.10.			IN	A

;; AUTHORITY SECTION:
.			419	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110801 1800 900 604800 86400

;; Query time: 121 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 09 05:02:57 CST 2019
;; MSG SIZE  rcvd: 115
Host info
10.80.106.2.in-addr.arpa domain name pointer cpe.ge-3-3-9-101.ambnqe10.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
10.80.106.2.in-addr.arpa	name = cpe.ge-3-3-9-101.ambnqe10.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.241.235.116 attackspam
Port probing on unauthorized port 26
2020-09-03 02:08:32
129.227.129.172 attackspambots
 TCP (SYN) 129.227.129.172:59788 -> port 4505, len 44
2020-09-03 01:50:17
103.81.86.49 attackbotsspam
Sep  2 23:56:45 NG-HHDC-SVS-001 sshd[30654]: Invalid user jboss from 103.81.86.49
...
2020-09-03 02:01:11
190.131.215.29 attackbots
190.131.215.29 - - [02/Sep/2020:19:01:03 +0200] "POST /xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (X11; OpenBSD i386) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36"
190.131.215.29 - - [02/Sep/2020:19:01:04 +0200] "POST /wordpress/xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (X11; OpenBSD i386) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36"
...
2020-09-03 02:03:08
77.68.20.116 attackspambots
Brute forcing email accounts
2020-09-03 02:23:04
188.217.181.18 attackbotsspam
Invalid user test from 188.217.181.18 port 35230
2020-09-03 02:21:00
163.172.207.224 attackspam
Wordpress attack
2020-09-03 02:22:43
5.104.50.149 attackspam
20/9/1@12:42:42: FAIL: Alarm-Network address from=5.104.50.149
20/9/1@12:42:43: FAIL: Alarm-Network address from=5.104.50.149
...
2020-09-03 02:10:11
167.99.99.10 attackbots
2020-09-02T17:46:28.499486vps773228.ovh.net sshd[21162]: Failed password for invalid user ajenti from 167.99.99.10 port 38536 ssh2
2020-09-02T17:50:35.393422vps773228.ovh.net sshd[21206]: Invalid user test from 167.99.99.10 port 45760
2020-09-02T17:50:35.406848vps773228.ovh.net sshd[21206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.99.10
2020-09-02T17:50:35.393422vps773228.ovh.net sshd[21206]: Invalid user test from 167.99.99.10 port 45760
2020-09-02T17:50:37.352993vps773228.ovh.net sshd[21206]: Failed password for invalid user test from 167.99.99.10 port 45760 ssh2
...
2020-09-03 02:10:32
144.168.164.26 attackbots
2020-09-02T12:27:05.950345mail.thespaminator.com sshd[28059]: Failed password for root from 144.168.164.26 port 48276 ssh2
2020-09-02T12:27:08.653053mail.thespaminator.com sshd[28059]: Failed password for root from 144.168.164.26 port 48276 ssh2
...
2020-09-03 01:51:24
47.55.85.116 attackbots
(sshd) Failed SSH login from 47.55.85.116 (CA/Canada/New Brunswick/Fredericton/fctnnbsc38w-47-55-85-116.dhcp-dynamic.fibreop.nb.bellaliant.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  1 12:42:13 atlas sshd[29356]: Invalid user admin from 47.55.85.116 port 35616
Sep  1 12:42:15 atlas sshd[29356]: Failed password for invalid user admin from 47.55.85.116 port 35616 ssh2
Sep  1 12:42:16 atlas sshd[29362]: Invalid user admin from 47.55.85.116 port 35703
Sep  1 12:42:18 atlas sshd[29362]: Failed password for invalid user admin from 47.55.85.116 port 35703 ssh2
Sep  1 12:42:18 atlas sshd[29370]: Invalid user admin from 47.55.85.116 port 35782
2020-09-03 02:17:50
200.194.41.106 attackbots
Icarus honeypot on github
2020-09-03 02:06:38
92.222.78.178 attackspam
Sep  1 21:30:30 auw2 sshd\[19943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.78.178  user=root
Sep  1 21:30:32 auw2 sshd\[19943\]: Failed password for root from 92.222.78.178 port 41128 ssh2
Sep  1 21:34:23 auw2 sshd\[20160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.78.178  user=root
Sep  1 21:34:25 auw2 sshd\[20160\]: Failed password for root from 92.222.78.178 port 48494 ssh2
Sep  1 21:38:17 auw2 sshd\[20410\]: Invalid user santos from 92.222.78.178
2020-09-03 02:20:35
159.65.157.221 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-03 01:54:41
160.155.53.22 attackbots
Invalid user akhan from 160.155.53.22 port 35182
2020-09-03 02:09:49

Recently Reported IPs

180.253.36.241 178.75.53.125 125.161.106.101 114.198.174.39
102.132.67.47 95.14.89.101 79.176.74.3 49.206.211.34
176.235.120.212 61.132.87.130 1.55.109.240 103.21.150.184
185.232.134.46 171.225.119.145 5.202.17.169 154.125.109.244
94.243.39.38 35.246.148.168 36.235.15.227 177.84.143.137