Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.149.31.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57105
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.149.31.22.			IN	A

;; AUTHORITY SECTION:
.			400	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011501 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 16 06:08:09 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 22.31.149.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.31.149.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.253.245.32 attackbots
Unauthorized connection attempt from IP address 182.253.245.32 on Port 445(SMB)
2020-03-23 21:59:22
119.30.32.137 attack
Unauthorized connection attempt from IP address 119.30.32.137 on Port 445(SMB)
2020-03-23 22:26:38
165.227.67.64 attackbots
Invalid user karika from 165.227.67.64 port 43324
2020-03-23 21:59:52
88.156.122.72 attackbots
Mar 23 18:45:08 gw1 sshd[32704]: Failed password for bin from 88.156.122.72 port 53972 ssh2
...
2020-03-23 21:51:16
125.123.128.62 attackspambots
Unauthorized connection attempt from IP address 125.123.128.62 on Port 445(SMB)
2020-03-23 22:02:50
115.79.213.64 attack
Unauthorized connection attempt from IP address 115.79.213.64 on Port 445(SMB)
2020-03-23 22:32:14
113.173.108.163 attackbots
Autoban   113.173.108.163 AUTH/CONNECT
2020-03-23 22:18:50
45.33.64.81 attackspam
scan r
2020-03-23 22:27:58
91.205.172.194 attackbotsspam
SSH Brute-Force Attack
2020-03-23 22:38:14
185.164.138.21 attackspambots
Mar 23 13:45:25 roki sshd[22030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.164.138.21  user=nobody
Mar 23 13:45:27 roki sshd[22030]: Failed password for nobody from 185.164.138.21 port 44718 ssh2
Mar 23 13:53:11 roki sshd[22612]: Invalid user mhlee from 185.164.138.21
Mar 23 13:53:11 roki sshd[22612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.164.138.21
Mar 23 13:53:14 roki sshd[22612]: Failed password for invalid user mhlee from 185.164.138.21 port 37306 ssh2
...
2020-03-23 22:01:27
118.21.43.84 attackbots
Honeypot attack, port: 81, PTR: i118-21-43-84.s30.a048.ap.plala.or.jp.
2020-03-23 21:54:03
124.92.127.102 attackbotsspam
[Fri Feb 21 23:00:52 2020] - Syn Flood From IP: 124.92.127.102 Port: 6000
2020-03-23 22:39:15
161.49.166.2 attackspam
[Thu Mar 12 06:17:19 2020] - Syn Flood From IP: 161.49.166.2 Port: 56387
2020-03-23 22:26:09
122.226.151.2 attack
Unauthorized connection attempt from IP address 122.226.151.2 on Port 445(SMB)
2020-03-23 22:40:41
68.74.123.67 attack
Mar 23 09:38:45 firewall sshd[24097]: Invalid user usuario from 68.74.123.67
Mar 23 09:38:47 firewall sshd[24097]: Failed password for invalid user usuario from 68.74.123.67 port 36146 ssh2
Mar 23 09:45:14 firewall sshd[24481]: Invalid user tj from 68.74.123.67
...
2020-03-23 22:13:42

Recently Reported IPs

8.95.129.142 241.178.230.221 32.45.239.246 45.148.65.160
218.186.118.4 230.168.48.196 141.219.147.22 236.91.201.68
189.6.253.40 61.99.9.117 37.140.53.91 224.118.101.238
160.180.69.247 222.2.147.184 230.65.137.223 116.227.143.65
251.79.186.67 175.99.16.22 250.123.237.154 189.41.192.3