Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zell am Main

Region: Bavaria

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.147.99.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22608
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.147.99.173.			IN	A

;; AUTHORITY SECTION:
.			521	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011500 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 15 21:38:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
173.99.147.80.in-addr.arpa domain name pointer p509363ad.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
173.99.147.80.in-addr.arpa	name = p509363ad.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
23.250.57.100 attack
MYH,DEF GET http://dev2.meyer-hosen.ie/adminer.php
2020-03-09 18:11:21
49.49.240.95 attackbotsspam
Honeypot attack, port: 445, PTR: mx-ll-49.49.240-95.dynamic.3bb.in.th.
2020-03-09 18:46:47
91.134.135.220 attackbots
Mar  9 07:16:32 vmd17057 sshd[29816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.135.220 
Mar  9 07:16:34 vmd17057 sshd[29816]: Failed password for invalid user rustserver from 91.134.135.220 port 37838 ssh2
...
2020-03-09 18:22:49
46.17.107.78 attackspambots
Unauthorised access (Mar  9) SRC=46.17.107.78 LEN=40 TTL=241 ID=12181 TCP DPT=445 WINDOW=1024 SYN
2020-03-09 18:26:45
203.78.110.53 attackspam
1433/tcp
[2020-03-09]1pkt
2020-03-09 18:49:07
82.215.100.131 attack
Attempted connection to port 21.
2020-03-09 18:46:25
111.229.33.175 attackbots
SSH/22 MH Probe, BF, Hack -
2020-03-09 18:36:58
182.23.8.114 attackbotsspam
20/3/9@03:41:57: FAIL: Alarm-Network address from=182.23.8.114
...
2020-03-09 18:44:14
177.75.6.46 attack
Unauthorized connection attempt from IP address 177.75.6.46 on Port 445(SMB)
2020-03-09 18:21:59
154.9.161.176 attack
MYH,DEF GET http://dev2.meyer-hosen.ie/adminer.php
2020-03-09 18:30:59
49.146.41.44 attack
Unauthorized connection attempt from IP address 49.146.41.44 on Port 445(SMB)
2020-03-09 18:16:25
210.12.130.219 attack
Mar  9 01:26:25 h2570396 sshd[19569]: Failed password for invalid user es from 210.12.130.219 port 46083 ssh2
Mar  9 01:26:25 h2570396 sshd[19569]: Received disconnect from 210.12.130.219: 11: Bye Bye [preauth]
Mar  9 01:31:03 h2570396 sshd[19992]: Connection closed by 210.12.130.219 [preauth]
Mar  9 01:35:14 h2570396 sshd[20038]: Connection closed by 210.12.130.219 [preauth]
Mar  9 01:37:17 h2570396 sshd[20098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.12.130.219  user=r.r
Mar  9 01:37:18 h2570396 sshd[20098]: Failed password for r.r from 210.12.130.219 port 54873 ssh2
Mar  9 01:37:19 h2570396 sshd[20098]: Received disconnect from 210.12.130.219: 11: Bye Bye [preauth]
Mar  9 01:39:53 h2570396 sshd[20160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.12.130.219  user=r.r
Mar  9 01:39:55 h2570396 sshd[20160]: Failed password for r.r from 210.12.130.219 port 47987 ssh2
Mar  9........
-------------------------------
2020-03-09 18:42:50
45.228.213.177 attackbotsspam
D-Link DSL-2750B Remote Command Execution Vulnerability
2020-03-09 18:53:21
117.4.186.177 attackspambots
Unauthorized connection attempt from IP address 117.4.186.177 on Port 445(SMB)
2020-03-09 18:10:58
210.212.231.34 attackbotsspam
Unauthorized connection attempt from IP address 210.212.231.34 on Port 445(SMB)
2020-03-09 18:31:59

Recently Reported IPs

24.34.210.87 135.227.229.69 228.81.203.132 27.64.164.167
194.135.229.204 167.198.109.20 186.157.164.135 97.94.202.123
144.153.169.92 204.154.62.50 187.230.190.25 6.78.32.28
118.91.28.203 250.248.31.112 162.83.64.87 115.19.89.42
69.51.75.36 4.78.251.124 18.162.161.115 183.45.138.22