Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.80.109.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64731
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.80.109.219.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 01:34:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 219.109.80.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.109.80.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.186.133.212 attackbotsspam
Unauthorized connection attempt from IP address 138.186.133.212 on Port 445(SMB)
2020-01-06 21:50:04
71.6.233.165 attackbotsspam
Metasploit VxWorks WDB Agent Scanner Detection
2020-01-06 22:02:21
123.21.23.3 attack
Brute-force attempt banned
2020-01-06 22:07:10
181.55.188.187 attackspambots
Jan  6 14:53:08 vmd17057 sshd\[14247\]: Invalid user pi from 181.55.188.187 port 43272
Jan  6 14:53:08 vmd17057 sshd\[14247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.55.188.187
Jan  6 14:53:10 vmd17057 sshd\[14247\]: Failed password for invalid user pi from 181.55.188.187 port 43272 ssh2
...
2020-01-06 22:12:19
14.192.215.243 attack
Forbidden directory scan :: 2020/01/06 13:15:09 [error] 16541#16541: *87327 access forbidden by rule, client: 14.192.215.243, server: [censored_1], request: "GET /downloads/WebcamViewerV1.0.zip HTTP/1.1", host: "www.[censored_1]", referrer: "https://www.[censored_1]/knowledge-base/windows-8/windows-8-how-to-view-web-camera-without-installing-software/"
2020-01-06 22:13:12
218.69.91.84 attack
Unauthorized connection attempt detected from IP address 218.69.91.84 to port 2220 [J]
2020-01-06 22:20:11
94.250.255.26 attack
Unauthorized connection attempt from IP address 94.250.255.26 on Port 445(SMB)
2020-01-06 22:00:40
201.184.75.210 attackspam
proto=tcp  .  spt=36141  .  dpt=25  .     (Found on   Dark List de Jan 06)     (323)
2020-01-06 22:25:31
95.24.18.62 attackspambots
Unauthorized connection attempt from IP address 95.24.18.62 on Port 445(SMB)
2020-01-06 22:06:16
120.55.54.26 attack
Unauthorized connection attempt from IP address 120.55.54.26 on Port 445(SMB)
2020-01-06 22:08:14
38.76.122.2 attack
Jan  6 14:58:08 localhost sshd\[16560\]: Invalid user aaw from 38.76.122.2 port 46052
Jan  6 14:58:08 localhost sshd\[16560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.76.122.2
Jan  6 14:58:10 localhost sshd\[16560\]: Failed password for invalid user aaw from 38.76.122.2 port 46052 ssh2
2020-01-06 22:11:49
136.232.13.34 attackspam
Unauthorized connection attempt from IP address 136.232.13.34 on Port 445(SMB)
2020-01-06 22:12:40
37.187.54.67 attackbots
Jan  6 11:16:13 vps46666688 sshd[17613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.67
Jan  6 11:16:15 vps46666688 sshd[17613]: Failed password for invalid user xrdp from 37.187.54.67 port 36995 ssh2
...
2020-01-06 22:24:42
110.137.102.231 attack
Unauthorized connection attempt from IP address 110.137.102.231 on Port 445(SMB)
2020-01-06 22:09:50
140.143.73.184 attack
Jan  6 11:19:02 vps46666688 sshd[17806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.73.184
Jan  6 11:19:03 vps46666688 sshd[17806]: Failed password for invalid user igor from 140.143.73.184 port 42568 ssh2
...
2020-01-06 22:27:10

Recently Reported IPs

120.85.113.169 23.150.64.181 27.5.26.133 5.157.8.27
14.240.141.60 120.59.123.244 77.208.112.234 137.25.242.59
179.91.200.35 185.225.39.112 183.248.114.110 103.2.141.96
40.107.101.82 178.72.75.195 201.139.89.81 111.93.119.174
220.130.207.241 220.184.38.92 209.85.208.172 103.230.152.99