Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.108.9.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.108.9.92.			IN	A

;; AUTHORITY SECTION:
.			442	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 19:25:20 CST 2022
;; MSG SIZE  rcvd: 104
Host info
92.9.108.80.in-addr.arpa domain name pointer 80-108-9-92.cable.dynamic.surfer.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
92.9.108.80.in-addr.arpa	name = 80-108-9-92.cable.dynamic.surfer.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
196.52.43.114 attack
Unauthorized connection attempt detected from IP address 196.52.43.114 to port 5000
2020-05-01 21:10:13
196.52.43.100 attackspam
5907/tcp 27017/tcp 2083/tcp...
[2020-03-04/04-30]54pkt,44pt.(tcp),3pt.(udp)
2020-05-01 21:12:19
139.162.104.208 attackbots
firewall-block, port(s): 21/tcp
2020-05-01 21:13:57
157.230.126.210 attackbots
firewall-block, port(s): 4302/tcp
2020-05-01 21:13:18
185.176.27.26 attack
scans 20 times in preceeding hours on the ports (in chronological order) 34194 34193 34192 34285 34283 34284 34299 34298 34300 34392 34394 34393 34487 34488 34486 34581 34582 34580 34596 34597 resulting in total of 107 scans from 185.176.27.0/24 block.
2020-05-01 20:49:49
148.70.96.124 attackspam
May  1 17:14:47 gw1 sshd[5256]: Failed password for root from 148.70.96.124 port 36686 ssh2
...
2020-05-01 20:50:18
80.82.69.130 attackspam
Port scan(s) denied
2020-05-01 21:26:00
206.189.66.91 attack
scans 2 times in preceeding hours on the ports (in chronological order) 7070 19801 resulting in total of 26 scans from 206.189.0.0/16 block.
2020-05-01 21:01:55
223.215.160.131 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-01 20:48:34
85.105.36.139 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-01 20:56:42
185.173.35.53 attackbotsspam
8088/tcp 47808/udp 593/tcp...
[2020-03-02/05-01]76pkt,53pt.(tcp),4pt.(udp)
2020-05-01 21:15:50
167.71.76.122 attack
2020-05-01T12:01:08.706888shield sshd\[674\]: Invalid user wellington from 167.71.76.122 port 39054
2020-05-01T12:01:08.711575shield sshd\[674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.76.122
2020-05-01T12:01:10.336366shield sshd\[674\]: Failed password for invalid user wellington from 167.71.76.122 port 39054 ssh2
2020-05-01T12:05:00.746466shield sshd\[1222\]: Invalid user bip from 167.71.76.122 port 50484
2020-05-01T12:05:00.750703shield sshd\[1222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.76.122
2020-05-01 21:16:28
151.80.57.181 attack
Automatic report - XMLRPC Attack
2020-05-01 20:49:32
134.122.117.230 attack
16592/tcp 2822/tcp 18666/tcp...
[2020-04-12/05-01]62pkt,21pt.(tcp)
2020-05-01 20:52:23
196.52.43.66 attackspam
Port scan(s) denied
2020-05-01 21:24:56

Recently Reported IPs

189.6.253.70 47.242.77.72 45.185.206.79 187.162.116.164
179.109.60.15 218.23.94.53 180.215.130.54 192.3.67.174
213.6.209.218 176.98.224.133 178.212.121.252 87.11.133.157
201.150.173.152 45.168.77.6 47.22.159.114 107.172.94.145
24.96.224.22 113.89.203.140 167.71.199.228 149.91.181.46