Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.152.49.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20625
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.152.49.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120800 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 00:26:25 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 196.49.152.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.49.152.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.192.213.140 attackspam
unauthorized connection attempt
2020-03-10 13:24:35
195.223.211.242 attackbotsspam
2020-03-10T05:30:02.945329shield sshd\[32603\]: Invalid user nx from 195.223.211.242 port 47752
2020-03-10T05:30:02.954675shield sshd\[32603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.211.242
2020-03-10T05:30:04.581361shield sshd\[32603\]: Failed password for invalid user nx from 195.223.211.242 port 47752 ssh2
2020-03-10T05:32:31.196553shield sshd\[473\]: Invalid user mysql from 195.223.211.242 port 60292
2020-03-10T05:32:31.203895shield sshd\[473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.211.242
2020-03-10 14:08:53
148.251.235.104 attackspam
20 attempts against mh-misbehave-ban on comet
2020-03-10 13:38:03
158.46.187.79 attackbotsspam
[Tue Mar 10 04:53:35.114584 2020] [authz_core:error] [pid 30062:tid 139882060023552] [client 158.46.187.79:51470] AH01630: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/
[Tue Mar 10 04:53:54.898492 2020] [authz_core:error] [pid 29953:tid 139882026452736] [client 158.46.187.79:53018] AH01630: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/
[Tue Mar 10 04:54:06.487704 2020] [authz_core:error] [pid 29149:tid 139882118772480] [client 158.46.187.79:53878] AH01630: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/
[Tue Mar 10 04:54:10.756271 2020] [authz_core:error] [pid 8702:tid 139881984489216] [client 158.46.187.79:54144] AH01630: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/
...
2020-03-10 13:49:54
209.141.35.177 attackbotsspam
unauthorized connection attempt
2020-03-10 14:08:30
179.232.1.252 attackspambots
Mar 10 10:30:09 gw1 sshd[16966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.252
Mar 10 10:30:11 gw1 sshd[16966]: Failed password for invalid user hobbit from 179.232.1.252 port 37268 ssh2
...
2020-03-10 13:50:46
218.92.0.145 attackbotsspam
Mar 10 06:25:59 nextcloud sshd\[10091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Mar 10 06:26:01 nextcloud sshd\[10091\]: Failed password for root from 218.92.0.145 port 46297 ssh2
Mar 10 06:26:05 nextcloud sshd\[10091\]: Failed password for root from 218.92.0.145 port 46297 ssh2
2020-03-10 13:40:25
106.13.36.103 attackspam
Mar 10 04:29:55 localhost sshd[31605]: Invalid user masespectaculo from 106.13.36.103 port 33284
Mar 10 04:29:55 localhost sshd[31605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.36.103
Mar 10 04:29:55 localhost sshd[31605]: Invalid user masespectaculo from 106.13.36.103 port 33284
Mar 10 04:29:57 localhost sshd[31605]: Failed password for invalid user masespectaculo from 106.13.36.103 port 33284 ssh2
Mar 10 04:36:21 localhost sshd[32307]: Invalid user masespectaculo from 106.13.36.103 port 59342
...
2020-03-10 13:28:34
103.94.6.69 attackbotsspam
Mar 10 09:51:15 gw1 sshd[15557]: Failed password for root from 103.94.6.69 port 60162 ssh2
...
2020-03-10 13:31:04
171.229.108.149 attack
1583812431 - 03/10/2020 04:53:51 Host: 171.229.108.149/171.229.108.149 Port: 445 TCP Blocked
2020-03-10 14:01:46
124.156.109.210 attack
Mar 10 05:32:55 ovpn sshd\[29878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.109.210  user=root
Mar 10 05:32:57 ovpn sshd\[29878\]: Failed password for root from 124.156.109.210 port 43336 ssh2
Mar 10 05:37:55 ovpn sshd\[31167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.109.210  user=root
Mar 10 05:37:57 ovpn sshd\[31167\]: Failed password for root from 124.156.109.210 port 46768 ssh2
Mar 10 05:40:10 ovpn sshd\[31769\]: Invalid user matt from 124.156.109.210
Mar 10 05:40:10 ovpn sshd\[31769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.109.210
2020-03-10 13:23:53
37.59.98.64 attackbots
Mar 10 06:48:51 vps691689 sshd[4726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.98.64
Mar 10 06:48:53 vps691689 sshd[4726]: Failed password for invalid user guoyifan from 37.59.98.64 port 45910 ssh2
Mar 10 06:54:21 vps691689 sshd[4883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.98.64
...
2020-03-10 14:03:31
92.221.145.57 attackbots
20 attempts against mh-misbehave-ban on pluto
2020-03-10 13:42:34
167.114.98.96 attack
$f2bV_matches
2020-03-10 13:54:54
49.235.94.172 attackbots
Mar 10 06:17:28 vps691689 sshd[3728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.94.172
Mar 10 06:17:30 vps691689 sshd[3728]: Failed password for invalid user yala from 49.235.94.172 port 59880 ssh2
...
2020-03-10 13:25:21

Recently Reported IPs

197.112.116.130 62.165.221.10 179.4.189.184 34.30.46.217
250.200.25.15 40.122.60.27 227.22.167.115 235.225.20.203
229.9.219.202 172.229.238.217 211.158.149.103 199.114.114.90
164.56.227.62 142.225.17.123 205.158.57.26 92.16.141.192
237.138.41.84 47.205.23.158 209.115.151.97 166.58.26.113