Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Århus

Region: Region Midtjylland

Country: Denmark

Internet Service Provider: TDC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.162.50.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46455
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.162.50.68.			IN	A

;; AUTHORITY SECTION:
.			204	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100601 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 07 02:11:05 CST 2023
;; MSG SIZE  rcvd: 105
Host info
68.50.162.80.in-addr.arpa domain name pointer 80-162-50-68-cable.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.50.162.80.in-addr.arpa	name = 80-162-50-68-cable.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.206.250.203 attackspambots
Unauthorized connection attempt detected from IP address 111.206.250.203 to port 5904
2020-04-12 14:44:37
129.211.138.177 attack
2020-04-12T05:39:18.517336shield sshd\[30710\]: Invalid user inma from 129.211.138.177 port 50800
2020-04-12T05:39:18.521004shield sshd\[30710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.138.177
2020-04-12T05:39:20.580559shield sshd\[30710\]: Failed password for invalid user inma from 129.211.138.177 port 50800 ssh2
2020-04-12T05:42:33.243050shield sshd\[31252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.138.177  user=root
2020-04-12T05:42:35.407681shield sshd\[31252\]: Failed password for root from 129.211.138.177 port 58822 ssh2
2020-04-12 14:23:03
101.50.1.32 attack
101.50.1.32 has been banned for [WebApp Attack]
...
2020-04-12 14:18:21
119.123.66.50 attackspambots
prod3
...
2020-04-12 14:27:11
51.68.44.158 attackspam
Apr 12 06:57:54 sso sshd[12835]: Failed password for root from 51.68.44.158 port 45200 ssh2
Apr 12 07:01:31 sso sshd[13272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.158
...
2020-04-12 14:47:24
165.227.211.13 attackbotsspam
web-1 [ssh] SSH Attack
2020-04-12 14:36:31
54.39.138.251 attackbots
detected by Fail2Ban
2020-04-12 14:20:08
138.197.5.191 attackspam
Apr 12 06:13:52 163-172-32-151 sshd[16780]: Invalid user khamphanh from 138.197.5.191 port 35108
...
2020-04-12 14:09:47
124.238.113.126 attack
Invalid user lpd from 124.238.113.126 port 54224
2020-04-12 14:38:50
37.43.60.43 attackspambots
Brute force attack against VPN service
2020-04-12 14:41:27
14.63.174.149 attackbotsspam
Apr 12 07:02:11 ns381471 sshd[14891]: Failed password for root from 14.63.174.149 port 52487 ssh2
2020-04-12 14:45:28
79.137.82.213 attack
Apr 12 07:54:22 markkoudstaal sshd[21780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213
Apr 12 07:54:23 markkoudstaal sshd[21780]: Failed password for invalid user niquette from 79.137.82.213 port 38550 ssh2
Apr 12 07:57:56 markkoudstaal sshd[22284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213
2020-04-12 14:18:56
51.159.35.94 attackbots
Brute-force attempt banned
2020-04-12 14:25:40
122.144.196.122 attackspam
SSH Authentication Attempts Exceeded
2020-04-12 14:07:28
138.204.27.114 attackbots
Apr 12 05:24:34 game-panel sshd[19027]: Failed password for root from 138.204.27.114 port 59697 ssh2
Apr 12 05:29:33 game-panel sshd[19235]: Failed password for root from 138.204.27.114 port 34193 ssh2
2020-04-12 14:08:23

Recently Reported IPs

112.193.186.29 134.59.55.32 53.205.83.185 1.239.158.176
72.215.211.109 156.136.157.62 38.54.151.160 159.166.217.144
68.137.32.128 30.67.238.1 54.253.37.146 57.163.21.236
40.56.224.219 255.158.90.32 62.161.81.144 119.33.73.202
25.30.133.15 125.175.145.112 81.236.21.42 237.216.76.11