Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stenløse

Region: Region Hovedstaden

Country: Denmark

Internet Service Provider: TDC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '80.196.29.64 - 80.196.29.127'

% Abuse contact for '80.196.29.64 - 80.196.29.127' is 'postmaster@abuse.mail.dk'

inetnum:        80.196.29.64 - 80.196.29.127
netname:        TDC-BREDBAANDSADSL-PROF-NET
descr:          TDC Bredbaand Professional users
country:        DK
remarks:        +---------------------------------------+
remarks:        | For abuse and security issues contact |
remarks:        | csirt@csirt.dk, http://www.csirt.dk   |
remarks:        +---------------------------------------+
remarks:        RIPE-update project Dec 2003 (Morten Madsen)
admin-c:        AS5071-RIPE
tech-c:         AS5071-RIPE
status:         ASSIGNED PA
mnt-by:         TDK-MNT
created:        2003-12-05T00:04:25Z
last-modified:  2003-12-05T00:04:25Z
source:         RIPE

role:           AS3292 Staff
address:        TDC A/S
address:        Sletvej 30, 8-062
address:        DK-8310 Tranbjerg
address:        Denmark
remarks:        contact info: http://as3292.peeringdb.com
admin-c:        NCB1-RIPE
admin-c:        MBP137-RIPE
tech-c:         NCB1-RIPE
tech-c:         CP11490-RIPE
tech-c:         MBP137-RIPE
nic-hdl:        AS5071-RIPE
mnt-by:         AS3292-MNT
created:        2002-07-02T13:36:00Z
last-modified:  2024-05-21T09:07:14Z
source:         RIPE # Filtered

% Information related to '80.196.0.0/14AS3292'

route:          80.196.0.0/14
descr:          TDC Tele Danmark
origin:         AS3292
remarks:        +---------------------------------------+
remarks:        | For abuse and security issues please  |
remarks:        | see http://postmaster.tdc.dk or       |
remarks:        | contact postmaster@abuse.mail.dk      |
remarks:        +---------------------------------------+
mnt-by:         AS3292-MNT
created:        2002-07-30T18:28:39Z
last-modified:  2010-10-28T13:04:08Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.196.29.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.196.29.71.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040303 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 10:29:33 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 71.29.196.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.29.196.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.231.8.214 attackbotsspam
IP attempted unauthorised action
2020-02-18 16:00:10
142.93.251.1 attack
Feb 18 07:07:05 sigma sshd\[17889\]: Invalid user ts from 142.93.251.1Feb 18 07:07:06 sigma sshd\[17889\]: Failed password for invalid user ts from 142.93.251.1 port 57214 ssh2
...
2020-02-18 16:28:34
125.137.191.215 attackspambots
Invalid user student3 from 125.137.191.215 port 41676
2020-02-18 16:22:09
5.196.75.47 attackbots
$f2bV_matches
2020-02-18 16:29:40
49.49.56.118 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 16:30:50
218.92.0.168 attack
Feb 18 09:03:59 SilenceServices sshd[12284]: Failed password for root from 218.92.0.168 port 22472 ssh2
Feb 18 09:04:02 SilenceServices sshd[12284]: Failed password for root from 218.92.0.168 port 22472 ssh2
Feb 18 09:04:05 SilenceServices sshd[12284]: Failed password for root from 218.92.0.168 port 22472 ssh2
Feb 18 09:04:09 SilenceServices sshd[12284]: Failed password for root from 218.92.0.168 port 22472 ssh2
2020-02-18 16:14:55
158.69.167.74 attackspambots
" "
2020-02-18 16:26:17
49.49.56.204 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 16:25:30
50.63.12.204 attackbots
WordPress login Brute force / Web App Attack on client site.
2020-02-18 16:26:45
123.20.8.185 attack
Feb 18 05:54:23 grey postfix/smtpd\[25066\]: NOQUEUE: reject: RCPT from unknown\[123.20.8.185\]: 554 5.7.1 Service unavailable\; Client host \[123.20.8.185\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?123.20.8.185\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-18 16:24:12
182.38.180.61 attackspam
firewall-block, port(s): 23/tcp
2020-02-18 15:56:01
198.46.135.194 attackbots
distributed scan
2020-02-18 16:32:40
37.48.80.82 attackspam
unauthorized connection attempt
2020-02-18 15:57:00
207.38.128.67 attack
Invalid user veeam from 207.38.128.67 port 46065
2020-02-18 16:21:24
178.128.76.6 attackspambots
Feb 18 07:23:12 [host] sshd[9848]: Invalid user 1q
Feb 18 07:23:12 [host] sshd[9848]: pam_unix(sshd:a
Feb 18 07:23:14 [host] sshd[9848]: Failed password
2020-02-18 16:26:00

Recently Reported IPs

216.80.76.45 108.130.162.2 194.88.98.83 110.77.248.21
2606:4700:10::6814:8273 2606:4700:10::6814:8608 2606:4700:10::6814:7682 2606:4700:10::6816:386
2606:4700:10::6814:6194 2606:4700:10::6814:5809 139.59.95.41 2606:4700:10::6816:3336
2606:4700:10::6814:9718 2606:4700:10::6816:2222 121.230.89.27 2606:4700:10::6816:4629
2606:4700:10::6814:8016 2606:4700:10::6816:1734 2606:4700:10::6814:4510 128.210.47.106