Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Werdau

Region: Saxony

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.149.0.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.149.0.253.			IN	A

;; AUTHORITY SECTION:
.			237	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021803 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 06:28:56 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 253.0.149.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.0.149.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.86.194.210 attackspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-30 04:42:53
103.215.53.52 attackbots
firewall-block, port(s): 2323/tcp
2020-09-30 04:54:44
106.12.138.72 attack
Sep 28 10:46:38 XXX sshd[60152]: Invalid user 51.254.2.202 from 106.12.138.72 port 52994
2020-09-30 05:02:21
180.218.224.84 attackspambots
Brute force SMTP login attempted.
...
2020-09-30 05:14:12
104.131.60.112 attackbotsspam
$f2bV_matches
2020-09-30 04:56:34
121.123.148.220 attackbots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-30 04:52:51
61.96.244.193 attackspam
Portscan detected
2020-09-30 04:46:49
128.199.85.141 attackbotsspam
Time:     Tue Sep 29 19:14:02 2020 +0000
IP:       128.199.85.141 (-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 29 19:09:52 18-1 sshd[15781]: Invalid user cyrus from 128.199.85.141 port 53196
Sep 29 19:09:54 18-1 sshd[15781]: Failed password for invalid user cyrus from 128.199.85.141 port 53196 ssh2
Sep 29 19:12:36 18-1 sshd[16093]: Invalid user olivia from 128.199.85.141 port 56090
Sep 29 19:12:38 18-1 sshd[16093]: Failed password for invalid user olivia from 128.199.85.141 port 56090 ssh2
Sep 29 19:14:00 18-1 sshd[16241]: Invalid user mailman from 128.199.85.141 port 46856
2020-09-30 05:01:58
118.40.139.200 attackbotsspam
SSH auth scanning - multiple failed logins
2020-09-30 04:37:24
219.92.4.201 attackbots
 TCP (SYN) 219.92.4.201:51670 -> port 1433, len 44
2020-09-30 04:58:29
217.14.211.216 attackspambots
Sep 29 05:06:45 124388 sshd[15288]: Failed password for invalid user sven from 217.14.211.216 port 53286 ssh2
Sep 29 05:10:21 124388 sshd[15600]: Invalid user postgres from 217.14.211.216 port 60506
Sep 29 05:10:21 124388 sshd[15600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.14.211.216
Sep 29 05:10:21 124388 sshd[15600]: Invalid user postgres from 217.14.211.216 port 60506
Sep 29 05:10:24 124388 sshd[15600]: Failed password for invalid user postgres from 217.14.211.216 port 60506 ssh2
2020-09-30 04:43:14
89.163.223.246 attack
2020-09-29T07:58:56.472868linuxbox-skyline sshd[216613]: Invalid user hadoop from 89.163.223.246 port 34876
...
2020-09-30 04:59:57
200.170.250.54 attackspam
Invalid user monitoring from 200.170.250.54 port 60844
2020-09-30 04:39:57
104.45.88.60 attackbotsspam
Invalid user admin from 104.45.88.60 port 54706
2020-09-30 05:12:23
91.213.50.99 attackspam
xmlrpc attack
2020-09-30 04:53:04

Recently Reported IPs

82.59.225.186 178.86.191.96 165.166.31.144 52.37.102.162
196.137.161.94 200.90.139.157 144.202.88.145 74.246.224.195
109.208.105.51 14.169.173.224 195.208.130.130 41.250.209.98
104.218.124.56 210.56.6.75 94.222.225.255 195.43.5.11
82.231.159.170 173.232.146.61 190.85.152.129 52.158.51.49