Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.29.25.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10287
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.29.25.80.			IN	A

;; AUTHORITY SECTION:
.			428	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:33:26 CST 2022
;; MSG SIZE  rcvd: 105
Host info
80.25.29.212.in-addr.arpa domain name pointer www.eurotopics.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.25.29.212.in-addr.arpa	name = www.eurotopics.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.247.74.200 attackspambots
$f2bV_matches
2020-09-17 13:18:29
34.123.129.190 attack
15 attacks on PHP URLs:
34.123.129.190 - - [16/Sep/2020:09:01:09 +0100] "GET //xmlrpc.php?rsd HTTP/1.1" 404 1124 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
2020-09-17 13:10:03
202.62.88.124 attackbots
Unauthorized connection attempt from IP address 202.62.88.124 on Port 445(SMB)
2020-09-17 13:29:39
107.6.169.253 attackspambots
[Sun Sep 13 03:50:29 2020] - DDoS Attack From IP: 107.6.169.253 Port: 14637
2020-09-17 13:32:57
206.189.235.139 attackspambots
Automatically reported by fail2ban report script (mx1)
2020-09-17 13:33:25
118.123.244.100 attackbotsspam
2020-09-16T16:54:27.086541dmca.cloudsearch.cf sshd[5514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.123.244.100  user=root
2020-09-16T16:54:29.445880dmca.cloudsearch.cf sshd[5514]: Failed password for root from 118.123.244.100 port 39296 ssh2
2020-09-16T16:58:22.791166dmca.cloudsearch.cf sshd[5686]: Invalid user localhost from 118.123.244.100 port 42394
2020-09-16T16:58:22.796095dmca.cloudsearch.cf sshd[5686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.123.244.100
2020-09-16T16:58:22.791166dmca.cloudsearch.cf sshd[5686]: Invalid user localhost from 118.123.244.100 port 42394
2020-09-16T16:58:24.748995dmca.cloudsearch.cf sshd[5686]: Failed password for invalid user localhost from 118.123.244.100 port 42394 ssh2
2020-09-16T17:01:15.239586dmca.cloudsearch.cf sshd[5793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.123.244.100  user=root
2020-09-
...
2020-09-17 13:40:37
175.6.35.46 attackspambots
Sep 17 03:56:43 vlre-nyc-1 sshd\[30046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.35.46  user=root
Sep 17 03:56:46 vlre-nyc-1 sshd\[30046\]: Failed password for root from 175.6.35.46 port 34342 ssh2
Sep 17 04:03:59 vlre-nyc-1 sshd\[30238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.35.46  user=root
Sep 17 04:04:01 vlre-nyc-1 sshd\[30238\]: Failed password for root from 175.6.35.46 port 46254 ssh2
Sep 17 04:06:01 vlre-nyc-1 sshd\[30318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.35.46  user=root
...
2020-09-17 13:28:31
125.212.217.214 attack
firewall-block, port(s): 2562/tcp
2020-09-17 13:36:23
119.192.206.158 attackbots
SSH brute force
2020-09-17 13:36:53
77.222.101.103 attackbotsspam
Honeypot attack, port: 445, PTR: pool-77-222-101-103.is74.ru.
2020-09-17 13:12:16
184.22.250.64 attack
Unauthorized connection attempt from IP address 184.22.250.64 on Port 445(SMB)
2020-09-17 13:42:02
201.87.246.233 attack
Icarus honeypot on github
2020-09-17 13:45:10
94.102.51.29 attackbotsspam
Sep 17 06:49:46 [host] kernel: [650237.167348] [UF
Sep 17 06:52:24 [host] kernel: [650395.510659] [UF
Sep 17 06:54:54 [host] kernel: [650545.632879] [UF
Sep 17 07:02:52 [host] kernel: [651023.513741] [UF
Sep 17 07:03:15 [host] kernel: [651046.924002] [UF
Sep 17 07:09:59 [host] kernel: [651450.920256] [UF
2020-09-17 13:31:26
27.50.21.157 attackbots
Unauthorized connection attempt from IP address 27.50.21.157 on Port 445(SMB)
2020-09-17 13:43:14
150.136.31.34 attackspam
Invalid user test from 150.136.31.34 port 37420
2020-09-17 13:33:39

Recently Reported IPs

212.29.25.72 212.29.25.92 212.3.121.114 212.3.150.88
212.3.150.31 212.3.166.145 212.3.194.221 212.3.206.168
212.3.194.222 212.3.255.100 212.30.174.180 212.3.120.245
212.3.242.80 212.30.118.74 212.30.60.97 212.30.60.102
212.30.36.54 212.30.36.80 212.30.36.63 212.30.36.64