Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: Deutsche Telekom AG

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.149.240.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57252
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.149.240.111.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 10 00:32:58 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 111.240.149.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 111.240.149.80.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
2.47.150.85 attack
Unauthorized connection attempt from IP address 2.47.150.85 on Port 445(SMB)
2020-04-08 06:49:02
173.44.164.125 attackbots
0,58-04/04 [bc02/m52] PostRequest-Spammer scoring: essen
2020-04-08 06:45:30
103.10.30.207 attackbotsspam
Apr  7 18:42:15 ws12vmsma01 sshd[7273]: Invalid user user from 103.10.30.207
Apr  7 18:42:17 ws12vmsma01 sshd[7273]: Failed password for invalid user user from 103.10.30.207 port 55318 ssh2
Apr  7 18:45:10 ws12vmsma01 sshd[7774]: Invalid user server from 103.10.30.207
...
2020-04-08 06:25:27
89.165.51.121 attackspam
Attempted connection to port 445.
2020-04-08 07:02:52
222.186.180.17 attack
2020-04-08T00:50:19.866370centos sshd[4062]: Failed password for root from 222.186.180.17 port 52468 ssh2
2020-04-08T00:50:25.047416centos sshd[4062]: Failed password for root from 222.186.180.17 port 52468 ssh2
2020-04-08T00:50:29.114796centos sshd[4062]: Failed password for root from 222.186.180.17 port 52468 ssh2
...
2020-04-08 06:51:40
220.248.30.58 attackspam
SSH bruteforce
2020-04-08 06:43:25
222.189.162.166 attackbotsspam
Attempted connection to port 1433.
2020-04-08 06:29:22
114.99.7.61 attackspambots
MAIL: User Login Brute Force Attempt
2020-04-08 06:56:21
83.48.89.147 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-08 07:00:48
149.200.136.234 attackspambots
Attempted connection to port 1433.
2020-04-08 06:34:58
212.154.217.254 attackbotsspam
Unauthorized connection attempt from IP address 212.154.217.254 on Port 445(SMB)
2020-04-08 06:40:54
111.229.33.175 attackspambots
$f2bV_matches
2020-04-08 06:24:00
95.168.171.153 attack
35022/tcp
[2020-04-07]1pkt
2020-04-08 07:02:07
165.22.106.100 attackbotsspam
Automatic report - XMLRPC Attack
2020-04-08 06:26:35
37.30.33.50 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/37.30.33.50/ 
 
 PL - 1H : (55)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN12912 
 
 IP : 37.30.33.50 
 
 CIDR : 37.30.0.0/15 
 
 PREFIX COUNT : 11 
 
 UNIQUE IP COUNT : 651264 
 
 
 ATTACKS DETECTED ASN12912 :  
  1H - 1 
  3H - 1 
  6H - 7 
 12H - 9 
 24H - 9 
 
 DateTime : 2020-04-07 23:45:31 
 
 INFO : Looking for resource vulnerabilities 403 Detected and Blocked by ADMIN  - data recovery
2020-04-08 06:58:42

Recently Reported IPs

38.133.122.101 77.0.15.216 65.239.211.83 189.213.19.55
58.197.191.99 115.49.123.13 32.222.251.4 88.137.182.104
222.221.166.215 141.101.88.239 201.62.185.172 115.15.192.81
128.243.9.206 106.79.151.99 120.36.94.0 45.108.177.12
2.199.131.139 172.45.77.90 213.148.210.30 71.228.22.119