Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: Com Hem AB

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbotsspam
Unauthorized connection attempt detected from IP address 80.216.147.22 to port 23 [J]
2020-03-03 00:46:26
Comments on same subnet:
IP Type Details Datetime
80.216.147.67 attack
Port probing on unauthorized port 5555
2020-02-29 04:45:32
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.216.147.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.216.147.22.			IN	A

;; AUTHORITY SECTION:
.			451	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030200 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 00:46:22 CST 2020
;; MSG SIZE  rcvd: 117
Host info
22.147.216.80.in-addr.arpa domain name pointer c80-216-147-22.bredband.comhem.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.147.216.80.in-addr.arpa	name = c80-216-147-22.bredband.comhem.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.162.182.243 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-08-04/10-04]7pkt,1pt.(tcp)
2019-10-05 03:50:43
157.230.218.128 attack
[04/Oct/2019:14:20:28 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-05 03:51:03
49.234.48.171 attack
Oct  4 14:06:38 icinga sshd[47866]: Failed password for root from 49.234.48.171 port 57704 ssh2
Oct  4 14:11:34 icinga sshd[51082]: Failed password for root from 49.234.48.171 port 39940 ssh2
...
2019-10-05 03:43:19
194.135.245.202 attack
445/tcp 445/tcp
[2019-08-17/10-04]2pkt
2019-10-05 03:34:36
157.147.112.224 attackspam
23/tcp 23/tcp 23/tcp...
[2019-09-18/10-04]4pkt,1pt.(tcp)
2019-10-05 03:34:23
157.55.39.85 attackbotsspam
Automatic report - Banned IP Access
2019-10-05 03:46:44
51.15.58.201 attackspam
Unauthorized SSH login attempts
2019-10-05 03:35:27
129.211.24.187 attackbotsspam
Oct  4 20:28:40 gw1 sshd[25006]: Failed password for root from 129.211.24.187 port 57161 ssh2
...
2019-10-05 03:52:03
168.126.85.225 attackbots
Oct 04 10:06:29 askasleikir sshd[59434]: Failed password for root from 168.126.85.225 port 54246 ssh2
2019-10-05 03:44:53
120.92.12.108 attackbots
B: f2b 404 5x
2019-10-05 03:24:21
123.207.126.58 attackbots
445/tcp 445/tcp 445/tcp...
[2019-08-05/10-04]8pkt,1pt.(tcp)
2019-10-05 03:45:34
89.248.174.214 attack
10/04/2019-15:24:43.698070 89.248.174.214 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98
2019-10-05 03:32:58
132.145.16.205 attack
Oct  4 21:26:54 bouncer sshd\[29393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.16.205  user=root
Oct  4 21:26:56 bouncer sshd\[29393\]: Failed password for root from 132.145.16.205 port 51146 ssh2
Oct  4 21:30:48 bouncer sshd\[29411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.16.205  user=root
...
2019-10-05 03:34:57
178.62.214.85 attackspambots
Automatic report - Banned IP Access
2019-10-05 03:17:38
187.190.236.88 attackbotsspam
Oct  4 14:57:41 lnxweb62 sshd[23973]: Failed password for root from 187.190.236.88 port 45430 ssh2
Oct  4 14:57:41 lnxweb62 sshd[23973]: Failed password for root from 187.190.236.88 port 45430 ssh2
2019-10-05 03:27:21

Recently Reported IPs

88.117.47.178 49.81.103.215 89.197.103.153 94.176.196.41
22.116.137.217 8.154.80.43 49.51.172.33 71.252.7.99
87.218.69.113 143.128.209.255 131.233.124.65 69.169.116.59
42.61.99.155 37.60.238.135 57.128.45.187 31.6.169.16
88.25.19.216 159.5.167.55 158.25.181.89 38.18.160.72