Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.209.49.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46409
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.209.49.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:32:29 CST 2025
;; MSG SIZE  rcvd: 106
Host info
147.49.209.80.in-addr.arpa domain name pointer 80.209.49.147.static.fibianet.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
147.49.209.80.in-addr.arpa	name = 80.209.49.147.static.fibianet.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
179.181.139.110 attackspam
Unauthorized connection attempt from IP address 179.181.139.110 on Port 445(SMB)
2020-09-24 23:38:59
178.62.6.215 attackbots
Invalid user development from 178.62.6.215 port 40914
2020-09-24 23:59:36
192.241.235.181 attackspambots
[-]:80 192.241.235.181 - - [24/Sep/2020:11:15:00 +0200] "GET /portal/redlion HTTP/1.1" 301 441 "-" "Mozilla/5.0 zgrab/0.x"
2020-09-24 23:19:09
106.52.141.36 attackspam
Sep 24 14:12:59 vps208890 sshd[45885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.141.36
2020-09-24 23:27:17
45.226.239.99 attackbots
Email rejected due to spam filtering
2020-09-24 23:43:25
80.14.140.41 attackbots
Automatic report - Banned IP Access
2020-09-24 23:25:10
159.65.9.229 attackbots
Sep 24 10:45:00 ws22vmsma01 sshd[119801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.9.229
Sep 24 10:45:01 ws22vmsma01 sshd[119801]: Failed password for invalid user sysadmin from 159.65.9.229 port 48314 ssh2
...
2020-09-24 23:24:26
201.18.21.178 attackbots
445/tcp 445/tcp 445/tcp...
[2020-07-25/09-24]30pkt,1pt.(tcp)
2020-09-24 23:38:07
40.76.192.252 attackbots
Sep 24 16:42:24 cdc sshd[32695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.76.192.252  user=root
Sep 24 16:42:26 cdc sshd[32695]: Failed password for invalid user root from 40.76.192.252 port 23043 ssh2
2020-09-24 23:53:24
103.147.64.179 attackbotsspam
20 attempts against mh-misbehave-ban on pluto
2020-09-24 23:57:37
40.117.41.114 attackspambots
[f2b] sshd bruteforce, retries: 1
2020-09-24 23:19:52
192.119.9.130 attackbots
Brute-force attempt banned
2020-09-24 23:58:32
113.22.236.73 attack
Unauthorized connection attempt from IP address 113.22.236.73 on Port 445(SMB)
2020-09-24 23:44:32
40.87.100.151 attackbots
sshd: Failed password for .... from 40.87.100.151 port 61111 ssh2
2020-09-24 23:32:14
45.162.123.9 attack
Sep 24 17:14:49 PorscheCustomer sshd[30732]: Failed password for root from 45.162.123.9 port 41034 ssh2
Sep 24 17:19:15 PorscheCustomer sshd[30841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.162.123.9
Sep 24 17:19:17 PorscheCustomer sshd[30841]: Failed password for invalid user redmine from 45.162.123.9 port 41816 ssh2
...
2020-09-24 23:34:29

Recently Reported IPs

245.82.116.71 74.131.234.162 16.104.187.186 22.7.24.14
126.13.131.127 242.134.113.127 194.140.2.104 242.119.32.136
197.108.140.117 60.137.204.209 243.189.103.150 200.14.140.224
142.161.150.0 30.47.140.169 240.12.71.131 33.234.11.131
13.109.101.50 52.119.18.13 243.24.131.232 130.87.109.159