Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Virum

Region: Capital Region

Country: Denmark

Internet Service Provider: TDC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.163.52.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30361
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.163.52.249.			IN	A

;; AUTHORITY SECTION:
.			324	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010301 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 04 10:04:42 CST 2022
;; MSG SIZE  rcvd: 106
Host info
249.52.163.80.in-addr.arpa domain name pointer 80-163-52-249-cable.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.52.163.80.in-addr.arpa	name = 80-163-52-249-cable.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
109.116.41.238 attackspambots
2020-04-16T23:29:30.559802upcloud.m0sh1x2.com sshd[479]: Invalid user ubuntu from 109.116.41.238 port 43854
2020-04-17 08:16:13
148.70.32.179 attack
[ssh] SSH attack
2020-04-17 07:54:41
212.129.50.137 attack
[2020-04-16 20:12:20] NOTICE[1170] chan_sip.c: Registration from '"400"' failed for '212.129.50.137:8162' - Wrong password
[2020-04-16 20:12:20] SECURITY[1184] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-04-16T20:12:20.896-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="400",SessionID="0x7f6c08341c08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.129.50.137/8162",Challenge="44a63db9",ReceivedChallenge="44a63db9",ReceivedHash="70ce35027082cd722d7062e31dc87e61"
[2020-04-16 20:13:05] NOTICE[1170] chan_sip.c: Registration from '"401"' failed for '212.129.50.137:8215' - Wrong password
[2020-04-16 20:13:05] SECURITY[1184] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-04-16T20:13:05.269-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="401",SessionID="0x7f6c0824ccd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.129
...
2020-04-17 08:17:47
83.216.184.90 attack
Unauthorized connection attempt from IP address 83.216.184.90 on Port 445(SMB)
2020-04-17 08:14:55
179.53.200.114 attackbots
Apr 17 01:31:29 ArkNodeAT sshd\[19153\]: Invalid user test from 179.53.200.114
Apr 17 01:31:29 ArkNodeAT sshd\[19153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.53.200.114
Apr 17 01:31:31 ArkNodeAT sshd\[19153\]: Failed password for invalid user test from 179.53.200.114 port 41106 ssh2
2020-04-17 08:10:06
83.0.189.110 attackspambots
Telnet Server BruteForce Attack
2020-04-17 08:09:20
98.147.122.206 attack
Automatic report - Port Scan Attack
2020-04-17 07:55:13
14.248.83.163 attack
Bruteforce detected by fail2ban
2020-04-17 07:52:04
190.85.152.129 attackspambots
Unauthorized connection attempt from IP address 190.85.152.129 on Port 445(SMB)
2020-04-17 08:17:59
189.212.116.84 attack
Automatic report - Port Scan Attack
2020-04-17 07:59:08
218.92.0.184 attackspam
Apr 16 23:52:44 game-panel sshd[14931]: Failed password for root from 218.92.0.184 port 4901 ssh2
Apr 16 23:52:46 game-panel sshd[14931]: Failed password for root from 218.92.0.184 port 4901 ssh2
Apr 16 23:52:56 game-panel sshd[14931]: error: maximum authentication attempts exceeded for root from 218.92.0.184 port 4901 ssh2 [preauth]
2020-04-17 07:58:43
222.186.42.7 attack
2020-04-17T02:03:20.117187sd-86998 sshd[7181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
2020-04-17T02:03:22.577870sd-86998 sshd[7181]: Failed password for root from 222.186.42.7 port 60574 ssh2
2020-04-17T02:03:24.582596sd-86998 sshd[7181]: Failed password for root from 222.186.42.7 port 60574 ssh2
2020-04-17T02:03:20.117187sd-86998 sshd[7181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
2020-04-17T02:03:22.577870sd-86998 sshd[7181]: Failed password for root from 222.186.42.7 port 60574 ssh2
2020-04-17T02:03:24.582596sd-86998 sshd[7181]: Failed password for root from 222.186.42.7 port 60574 ssh2
2020-04-17T02:03:20.117187sd-86998 sshd[7181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
2020-04-17T02:03:22.577870sd-86998 sshd[7181]: Failed password for root from 222.186.42.7 port 6057
...
2020-04-17 08:05:15
93.29.187.145 attackspambots
$f2bV_matches
2020-04-17 08:01:42
222.186.31.166 attackbots
2020-04-17T02:14:07.240719sd-86998 sshd[8164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
2020-04-17T02:14:08.853465sd-86998 sshd[8164]: Failed password for root from 222.186.31.166 port 46335 ssh2
2020-04-17T02:14:11.689524sd-86998 sshd[8164]: Failed password for root from 222.186.31.166 port 46335 ssh2
2020-04-17T02:14:07.240719sd-86998 sshd[8164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
2020-04-17T02:14:08.853465sd-86998 sshd[8164]: Failed password for root from 222.186.31.166 port 46335 ssh2
2020-04-17T02:14:11.689524sd-86998 sshd[8164]: Failed password for root from 222.186.31.166 port 46335 ssh2
2020-04-17T02:14:07.240719sd-86998 sshd[8164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
2020-04-17T02:14:08.853465sd-86998 sshd[8164]: Failed password for root from 222.186.
...
2020-04-17 08:17:28
134.122.102.158 attack
nft/Honeypot
2020-04-17 08:13:05

Recently Reported IPs

63.95.101.160 81.138.238.252 220.132.194.168 70.225.216.125
14.17.121.236 244.203.79.11 251.182.41.226 38.150.160.85
203.106.85.58 63.110.101.151 192.243.32.168 57.201.225.169
167.17.15.27 23.81.7.173 253.52.45.159 117.136.144.253
75.53.86.240 241.238.165.46 237.249.93.84 78.89.4.233