Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.2.245.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.2.245.129.			IN	A

;; AUTHORITY SECTION:
.			355	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 17:29:09 CST 2022
;; MSG SIZE  rcvd: 105
Host info
129.245.2.80.in-addr.arpa domain name pointer cpc150060-watf12-2-0-cust128.15-2.cable.virginm.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.245.2.80.in-addr.arpa	name = cpc150060-watf12-2-0-cust128.15-2.cable.virginm.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.252.174.141 attackspambots
Automatic report - XMLRPC Attack
2020-02-14 01:12:28
94.67.130.179 attackbots
Feb 13 14:47:45 debian-2gb-nbg1-2 kernel: \[3860893.079721\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.67.130.179 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=52 ID=60289 PROTO=TCP SPT=20523 DPT=9530 WINDOW=53285 RES=0x00 SYN URGP=0
2020-02-14 01:22:06
14.215.176.155 attackbots
ICMP MH Probe, Scan /Distributed -
2020-02-14 01:04:07
49.233.138.118 attackspambots
Feb 13 06:46:50 auw2 sshd\[30771\]: Invalid user sandin from 49.233.138.118
Feb 13 06:46:50 auw2 sshd\[30771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.138.118
Feb 13 06:46:52 auw2 sshd\[30771\]: Failed password for invalid user sandin from 49.233.138.118 port 42922 ssh2
Feb 13 06:51:27 auw2 sshd\[31203\]: Invalid user cpsrvsid from 49.233.138.118
Feb 13 06:51:27 auw2 sshd\[31203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.138.118
2020-02-14 00:51:54
27.106.18.218 attackbots
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.106.18.218 
Failed password for invalid user testftp from 27.106.18.218 port 46074 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.106.18.218
2020-02-14 01:14:03
1.52.166.17 attack
1581601657 - 02/13/2020 14:47:37 Host: 1.52.166.17/1.52.166.17 Port: 445 TCP Blocked
2020-02-14 01:30:55
191.5.119.91 attackbotsspam
Automatic report - Port Scan Attack
2020-02-14 01:09:31
193.188.22.217 attackspambots
RDP (aggressivity: low)
2020-02-14 01:04:35
14.136.134.199 attackspambots
ICMP MH Probe, Scan /Distributed -
2020-02-14 01:26:15
178.128.220.8 attackspam
Automatic report - XMLRPC Attack
2020-02-14 00:55:23
185.53.91.28 attack
Port 443 (HTTPS) access denied
2020-02-14 01:28:06
192.241.229.242 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 00:53:23
111.93.156.74 attackbotsspam
Feb 13 17:58:40 MK-Soft-Root2 sshd[18356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.156.74 
Feb 13 17:58:42 MK-Soft-Root2 sshd[18356]: Failed password for invalid user sandin from 111.93.156.74 port 37368 ssh2
...
2020-02-14 01:02:49
185.53.88.78 attackbots
Port 5097 scan denied
2020-02-14 01:01:48
14.215.176.179 attackspam
ICMP MH Probe, Scan /Distributed -
2020-02-14 00:52:10

Recently Reported IPs

223.155.167.218 2.179.37.146 187.120.149.163 2.183.106.103
120.85.183.160 179.189.204.216 1.204.69.73 114.237.57.120
103.78.237.112 123.26.111.203 223.87.179.182 188.254.109.202
84.205.180.25 41.33.131.166 103.67.165.18 125.45.48.13
190.103.29.163 187.147.76.95 5.138.221.4 180.138.49.214