Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vienna

Region: Vienna

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.94.80.223
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.94.80.223.			IN	A

;; AUTHORITY SECTION:
.			225	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030100 1800 900 604800 86400

;; Query time: 202 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 01 15:35:21 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 223.80.94.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 223.80.94.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.27.213.89 attackspambots
SASL Brute Force
2019-07-08 04:23:08
187.137.175.172 attackspambots
Unauthorized connection attempt from IP address 187.137.175.172 on Port 445(SMB)
2019-07-08 04:02:51
107.6.171.130 attackspam
Jul  7 13:31:51 *** sshd[20736]: Did not receive identification string from 107.6.171.130
2019-07-08 04:00:11
184.22.163.73 attackbotsspam
Unauthorized connection attempt from IP address 184.22.163.73 on Port 445(SMB)
2019-07-08 04:33:03
113.169.94.158 attack
utm - spam
2019-07-08 04:30:55
115.74.213.139 attack
Unauthorized connection attempt from IP address 115.74.213.139 on Port 445(SMB)
2019-07-08 03:48:27
207.46.13.185 attackspam
Automatic report - Web App Attack
2019-07-08 04:26:20
41.193.46.253 attackbotsspam
RDP Brute-Force (Grieskirchen RZ1)
2019-07-08 03:52:11
1.54.5.109 attackbotsspam
Unauthorized connection attempt from IP address 1.54.5.109 on Port 445(SMB)
2019-07-08 03:49:52
134.209.97.225 attackbots
Jul  7 19:48:31 legacy sshd[2056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.97.225
Jul  7 19:48:32 legacy sshd[2056]: Failed password for invalid user client from 134.209.97.225 port 52148 ssh2
Jul  7 19:51:55 legacy sshd[2130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.97.225
...
2019-07-08 04:25:00
186.227.33.86 attackbotsspam
SMTP-sasl brute force
...
2019-07-08 03:48:51
170.244.13.226 attackbots
SMTP-sasl brute force
...
2019-07-08 03:56:03
159.203.109.246 attackspambots
scan r
2019-07-08 04:17:59
183.105.56.37 attackspam
Automatic report
2019-07-08 04:13:32
39.113.110.79 attackspam
Jul  7 19:01:33 vibhu-HP-Z238-Microtower-Workstation sshd\[28841\]: Invalid user admin from 39.113.110.79
Jul  7 19:01:33 vibhu-HP-Z238-Microtower-Workstation sshd\[28841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.113.110.79
Jul  7 19:01:34 vibhu-HP-Z238-Microtower-Workstation sshd\[28841\]: Failed password for invalid user admin from 39.113.110.79 port 52772 ssh2
Jul  7 19:01:36 vibhu-HP-Z238-Microtower-Workstation sshd\[28841\]: Failed password for invalid user admin from 39.113.110.79 port 52772 ssh2
Jul  7 19:01:38 vibhu-HP-Z238-Microtower-Workstation sshd\[28841\]: Failed password for invalid user admin from 39.113.110.79 port 52772 ssh2
...
2019-07-08 04:08:33

Recently Reported IPs

218.225.98.73 184.26.245.37 222.244.202.4 184.44.213.37
91.194.23.50 202.214.48.106 110.167.186.90 150.46.173.156
31.7.62.29 54.52.198.99 2.81.236.4 16.202.140.49
37.52.32.112 54.48.119.101 151.75.215.237 71.124.37.253
12.174.230.116 133.217.136.67 69.162.109.106 81.158.62.52