Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.214.139.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18263
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.214.139.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 21:31:28 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.139.214.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.139.214.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.234.236.174 attackspam
SSH Brute Force
2020-04-17 05:19:21
129.211.46.112 attackspambots
SSH Brute Force
2020-04-17 05:33:47
188.166.117.213 attack
Apr 17 01:37:26 gw1 sshd[14875]: Failed password for root from 188.166.117.213 port 43486 ssh2
...
2020-04-17 05:26:53
91.121.221.195 attack
k+ssh-bruteforce
2020-04-17 05:39:12
185.46.18.99 attack
SSH Brute Force
2020-04-17 05:28:06
203.192.204.168 attack
SSH Brute Force
2020-04-17 05:22:41
37.59.123.166 attackbotsspam
Automatic report BANNED IP
2020-04-17 05:45:07
49.233.163.185 attackbots
SSH Brute Force
2020-04-17 05:19:41
178.32.117.80 attack
Apr 16 23:13:44 [host] sshd[17363]: Invalid user u
Apr 16 23:13:44 [host] sshd[17363]: pam_unix(sshd:
Apr 16 23:13:46 [host] sshd[17363]: Failed passwor
2020-04-17 05:29:39
54.222.217.21 attack
SSH Brute Force
2020-04-17 05:41:23
121.135.146.56 attackbotsspam
SSH Brute Force
2020-04-17 05:34:06
49.247.196.128 attackbotsspam
SSH Brute Force
2020-04-17 05:19:01
167.71.12.95 attackspambots
Apr 16 23:09:39 legacy sshd[29979]: Failed password for root from 167.71.12.95 port 52342 ssh2
Apr 16 23:14:53 legacy sshd[30144]: Failed password for root from 167.71.12.95 port 55220 ssh2
...
2020-04-17 05:31:12
218.29.126.86 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-04-17 05:47:49
64.225.12.205 attackbotsspam
SSH Brute Force
2020-04-17 05:17:43

Recently Reported IPs

147.157.167.60 87.186.123.36 176.229.112.255 184.174.45.252
244.100.34.103 116.211.5.254 115.126.82.35 76.54.180.120
48.41.201.176 250.178.195.73 241.252.178.125 38.214.31.244
62.195.100.237 42.108.102.0 45.7.107.68 151.94.88.57
222.227.39.233 104.16.225.205 84.248.14.35 189.112.35.213