Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.216.4.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.216.4.47.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 10:32:07 CST 2025
;; MSG SIZE  rcvd: 104
Host info
47.4.216.80.in-addr.arpa domain name pointer c80-216-4-47.bredband.tele2.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
47.4.216.80.in-addr.arpa	name = c80-216-4-47.bredband.tele2.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.162.191.160 attackbotsspam
Aug 16 01:43:35 srv206 sshd[21665]: Invalid user pn from 112.162.191.160
...
2019-08-16 11:50:28
69.47.93.209 attack
9000/tcp
[2019-08-15]1pkt
2019-08-16 11:40:04
180.250.115.215 attack
Aug 16 05:29:28 [host] sshd[7997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.115.215  user=root
Aug 16 05:29:30 [host] sshd[7997]: Failed password for root from 180.250.115.215 port 38129 ssh2
Aug 16 05:34:52 [host] sshd[8139]: Invalid user amp from 180.250.115.215
2019-08-16 11:43:03
51.15.209.128 attackspambots
2019-07-25T12:59:35.112342wiz-ks3 sshd[19091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit-1.droideka.ovh  user=root
2019-07-25T12:59:36.948074wiz-ks3 sshd[19091]: Failed password for root from 51.15.209.128 port 56482 ssh2
2019-07-25T12:59:38.572655wiz-ks3 sshd[19091]: Failed password for root from 51.15.209.128 port 56482 ssh2
2019-07-25T12:59:35.112342wiz-ks3 sshd[19091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit-1.droideka.ovh  user=root
2019-07-25T12:59:36.948074wiz-ks3 sshd[19091]: Failed password for root from 51.15.209.128 port 56482 ssh2
2019-07-25T12:59:38.572655wiz-ks3 sshd[19091]: Failed password for root from 51.15.209.128 port 56482 ssh2
2019-07-25T12:59:35.112342wiz-ks3 sshd[19091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit-1.droideka.ovh  user=root
2019-07-25T12:59:36.948074wiz-ks3 sshd[19091]: Failed password for root from 51.15.209
2019-08-16 11:37:21
34.67.72.34 attackbotsspam
Aug 15 13:50:13 hiderm sshd\[22232\]: Invalid user jpg from 34.67.72.34
Aug 15 13:50:13 hiderm sshd\[22232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.72.67.34.bc.googleusercontent.com
Aug 15 13:50:15 hiderm sshd\[22232\]: Failed password for invalid user jpg from 34.67.72.34 port 55636 ssh2
Aug 15 13:54:31 hiderm sshd\[22623\]: Invalid user payments from 34.67.72.34
Aug 15 13:54:31 hiderm sshd\[22623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.72.67.34.bc.googleusercontent.com
2019-08-16 12:00:57
200.85.42.42 attackspam
Aug 15 17:07:48 php2 sshd\[23976\]: Invalid user smith from 200.85.42.42
Aug 15 17:07:48 php2 sshd\[23976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.85.42.42
Aug 15 17:07:49 php2 sshd\[23976\]: Failed password for invalid user smith from 200.85.42.42 port 47776 ssh2
Aug 15 17:13:49 php2 sshd\[24685\]: Invalid user ks from 200.85.42.42
Aug 15 17:13:50 php2 sshd\[24685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.85.42.42
2019-08-16 11:52:01
103.221.254.73 attackspambots
proto=tcp  .  spt=38601  .  dpt=25  .     (listed on Blocklist de  Aug 15)     (813)
2019-08-16 11:59:49
51.83.73.160 attack
Automated report - ssh fail2ban:
Aug 16 03:56:45 authentication failure 
Aug 16 03:56:47 wrong password, user=joelma, port=40562, ssh2
2019-08-16 11:45:17
62.234.95.148 attackbots
Aug 15 21:59:35 raspberrypi sshd\[25029\]: Invalid user hadoop from 62.234.95.148Aug 15 21:59:37 raspberrypi sshd\[25029\]: Failed password for invalid user hadoop from 62.234.95.148 port 42784 ssh2Aug 15 22:20:01 raspberrypi sshd\[25582\]: Invalid user cacti from 62.234.95.148
...
2019-08-16 11:58:04
104.131.224.81 attackspam
Automatic report - Banned IP Access
2019-08-16 11:56:21
113.116.91.40 attackspambots
port scan and connect, tcp 23 (telnet)
2019-08-16 11:44:09
117.66.243.77 attackspam
Aug 16 00:19:48 v22018076622670303 sshd\[28558\]: Invalid user helpdesk from 117.66.243.77 port 43483
Aug 16 00:19:48 v22018076622670303 sshd\[28558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.66.243.77
Aug 16 00:19:50 v22018076622670303 sshd\[28558\]: Failed password for invalid user helpdesk from 117.66.243.77 port 43483 ssh2
...
2019-08-16 12:16:43
186.251.208.148 attack
proto=tcp  .  spt=52646  .  dpt=25  .     (listed on Blocklist de  Aug 15)     (818)
2019-08-16 11:46:13
182.112.13.172 attackbots
$f2bV_matches
2019-08-16 12:16:15
128.199.178.72 attackspambots
TCP src-port=52720   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (24)
2019-08-16 12:05:59

Recently Reported IPs

93.19.170.198 239.71.215.94 67.139.218.103 167.95.79.82
106.201.52.62 192.10.134.249 93.254.38.73 118.16.8.119
196.247.133.41 205.181.165.242 157.70.47.61 18.211.37.197
89.188.137.73 138.169.235.4 202.236.19.8 58.146.198.42
25.11.134.249 38.226.191.249 55.145.111.140 159.173.91.234