Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.149.170.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51196
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.149.170.80.			IN	A

;; AUTHORITY SECTION:
.			242	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 19:00:00 CST 2022
;; MSG SIZE  rcvd: 107
Host info
80.170.149.217.in-addr.arpa domain name pointer 217-149-170-80.nat.highway.telekom.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.170.149.217.in-addr.arpa	name = 217-149-170-80.nat.highway.telekom.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.92.209.215 attackspambots
Multiple SSH authentication failures from 34.92.209.215
2020-07-01 20:00:26
185.47.160.247 attack
Unauthorized connection attempt from IP address 185.47.160.247 on Port 445(SMB)
2020-07-01 19:49:47
46.99.178.18 attack
Icarus honeypot on github
2020-07-01 19:59:24
59.126.228.228 attackspam
Honeypot attack, port: 81, PTR: 59-126-228-228.HINET-IP.hinet.net.
2020-07-01 20:03:47
185.143.72.25 attackbots
abuse-sasl
2020-07-01 19:53:18
195.139.207.113 attackspam
trying to access non-authorized port
2020-07-01 20:14:12
5.34.160.38 attack
unauthorized connection attempt
2020-07-01 19:28:29
1.34.254.28 attack
unauthorized connection attempt
2020-07-01 19:56:28
59.127.203.50 attackbotsspam
 TCP (SYN) 59.127.203.50:42000 -> port 2323, len 44
2020-07-01 19:40:07
122.51.192.105 attackbotsspam
...
2020-07-01 19:17:20
79.124.62.18 attackspambots
 TCP (SYN) 79.124.62.18:44645 -> port 3400, len 44
2020-07-01 20:13:02
220.133.53.120 attack
 TCP (SYN) 220.133.53.120:38513 -> port 80, len 44
2020-07-01 19:41:22
45.55.173.232 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-01 20:01:49
171.247.155.204 attackspam
unauthorized connection attempt
2020-07-01 20:07:21
178.161.255.106 attackspambots
DATE:2020-06-30 11:43:17, IP:178.161.255.106, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-07-01 19:26:01

Recently Reported IPs

231.182.194.143 210.200.29.87 251.164.117.82 210.120.0.199
106.244.162.238 47.20.161.19 26.6.113.237 140.107.126.254
140.175.42.49 219.58.43.28 151.171.58.152 116.70.199.32
205.220.43.136 116.251.75.38 111.145.181.199 133.222.238.213
112.112.188.119 132.133.41.23 153.7.179.223 120.23.157.53