Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Steyr

Region: Upper Austria

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.122.55.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51099
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.122.55.114.			IN	A

;; AUTHORITY SECTION:
.			296	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121901 1800 900 604800 86400

;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 20 03:46:01 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 114.55.122.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.55.122.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.19.19.162 attack
Invalid user admin from 188.19.19.162 port 56039
2019-07-28 06:06:57
202.105.18.222 attack
Invalid user farah from 202.105.18.222 port 26079
2019-07-28 06:04:05
73.55.140.184 attackbots
Invalid user test from 73.55.140.184 port 48876
2019-07-28 06:46:14
193.188.22.220 attack
Invalid user monitor from 193.188.22.220 port 23373
2019-07-28 06:05:58
223.83.155.77 attack
Jul 27 20:12:31 MK-Soft-VM6 sshd\[1477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.83.155.77  user=root
Jul 27 20:12:34 MK-Soft-VM6 sshd\[1477\]: Failed password for root from 223.83.155.77 port 52748 ssh2
Jul 27 20:21:34 MK-Soft-VM6 sshd\[1555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.83.155.77  user=root
...
2019-07-28 06:00:55
139.59.39.174 attack
Invalid user jira from 139.59.39.174 port 36578
2019-07-28 06:41:52
104.248.211.180 attack
Jul 27 22:07:45 *** sshd[8271]: User root from 104.248.211.180 not allowed because not listed in AllowUsers
2019-07-28 06:21:27
157.48.28.155 attackspam
Unauthorized connection attempt from IP address 157.48.28.155 on Port 445(SMB)
2019-07-28 06:39:49
165.22.167.39 attackbots
Invalid user admin from 165.22.167.39 port 43902
2019-07-28 06:13:30
92.141.137.152 attackspam
Invalid user oscar from 92.141.137.152 port 48022
2019-07-28 06:24:11
90.127.199.222 attackspambots
Invalid user adminftp from 90.127.199.222 port 33848
2019-07-28 06:24:33
212.48.93.248 attack
WordPress brute force
2019-07-28 06:32:22
185.220.101.67 attackspam
Invalid user admin from 185.220.101.67 port 39851
2019-07-28 06:37:03
45.55.157.147 attack
Invalid user postgres from 45.55.157.147 port 32846
2019-07-28 06:28:03
113.190.25.247 attackspambots
Invalid user admin from 113.190.25.247 port 46497
2019-07-28 06:20:38

Recently Reported IPs

77.136.135.111 202.101.17.162 41.39.229.6 168.139.225.188
207.203.155.162 195.166.45.161 106.204.80.116 109.193.247.125
76.95.213.145 129.28.250.100 77.1.142.83 200.54.12.43
159.90.164.121 110.238.78.208 105.161.7.7 164.12.78.184
113.91.248.131 81.14.86.15 12.138.244.137 187.205.254.132