Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Somogyvar

Region: Somogy

Country: Hungary

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.252.50.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39384
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.252.50.49.			IN	A

;; AUTHORITY SECTION:
.			305	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020301 1800 900 604800 86400

;; Query time: 128 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 07:06:27 CST 2020
;; MSG SIZE  rcvd: 116
Host info
49.50.252.80.in-addr.arpa domain name pointer canet-1561.kapos-net.hu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.50.252.80.in-addr.arpa	name = canet-1561.kapos-net.hu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.205.118.165 attackspam
Port Scan
...
2020-09-07 05:02:27
161.35.200.233 attack
Sep  6 21:42:40 vpn01 sshd[19317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.200.233
Sep  6 21:42:41 vpn01 sshd[19317]: Failed password for invalid user bb2server from 161.35.200.233 port 49646 ssh2
...
2020-09-07 04:59:03
41.77.6.27 attack
[ER hit] Tried to deliver spam. Already well known.
2020-09-07 05:05:34
222.186.169.192 attack
Sep  6 21:02:50 instance-2 sshd[29110]: Failed password for root from 222.186.169.192 port 2698 ssh2
Sep  6 21:02:54 instance-2 sshd[29110]: Failed password for root from 222.186.169.192 port 2698 ssh2
Sep  6 21:02:59 instance-2 sshd[29110]: Failed password for root from 222.186.169.192 port 2698 ssh2
Sep  6 21:03:03 instance-2 sshd[29110]: Failed password for root from 222.186.169.192 port 2698 ssh2
2020-09-07 05:10:30
141.98.9.166 attackbotsspam
2020-09-06T21:19:36.888031shield sshd\[25459\]: Invalid user admin from 141.98.9.166 port 41781
2020-09-06T21:19:36.899421shield sshd\[25459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.166
2020-09-06T21:19:39.136916shield sshd\[25459\]: Failed password for invalid user admin from 141.98.9.166 port 41781 ssh2
2020-09-06T21:20:02.381255shield sshd\[25519\]: Invalid user ubnt from 141.98.9.166 port 39141
2020-09-06T21:20:02.395460shield sshd\[25519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.166
2020-09-07 05:26:27
141.98.9.162 attack
Sep  6 20:52:31 scw-6657dc sshd[31842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.162
Sep  6 20:52:31 scw-6657dc sshd[31842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.162
Sep  6 20:52:33 scw-6657dc sshd[31842]: Failed password for invalid user operator from 141.98.9.162 port 55474 ssh2
...
2020-09-07 05:18:59
222.186.175.154 attackspambots
Sep  6 23:11:01 minden010 sshd[20537]: Failed password for root from 222.186.175.154 port 29928 ssh2
Sep  6 23:11:10 minden010 sshd[20537]: Failed password for root from 222.186.175.154 port 29928 ssh2
Sep  6 23:11:12 minden010 sshd[20537]: Failed password for root from 222.186.175.154 port 29928 ssh2
Sep  6 23:11:12 minden010 sshd[20537]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 29928 ssh2 [preauth]
...
2020-09-07 05:12:02
190.211.240.227 attackspambots
Honeypot attack, port: 445, PTR: fujikura.com.py.
2020-09-07 05:28:16
143.202.179.12 attackbots
Automatic report - Port Scan Attack
2020-09-07 05:36:21
2402:3a80:df6:921a:455:b325:7188:abea attack
Wordpress attack
2020-09-07 05:20:03
37.187.54.45 attack
SSH login attempts.
2020-09-07 05:05:48
222.186.175.167 attack
Sep  6 20:52:46 instance-2 sshd[28885]: Failed password for root from 222.186.175.167 port 9642 ssh2
Sep  6 20:52:50 instance-2 sshd[28885]: Failed password for root from 222.186.175.167 port 9642 ssh2
Sep  6 20:52:54 instance-2 sshd[28885]: Failed password for root from 222.186.175.167 port 9642 ssh2
Sep  6 20:52:57 instance-2 sshd[28885]: Failed password for root from 222.186.175.167 port 9642 ssh2
2020-09-07 05:14:23
113.116.98.192 attack
spam
2020-09-07 05:35:35
129.28.185.31 attackbotsspam
Sep  6 20:55:32 dev0-dcde-rnet sshd[12374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.185.31
Sep  6 20:55:34 dev0-dcde-rnet sshd[12374]: Failed password for invalid user derek from 129.28.185.31 port 51256 ssh2
Sep  6 20:59:32 dev0-dcde-rnet sshd[12390]: Failed password for root from 129.28.185.31 port 39218 ssh2
2020-09-07 05:32:28
212.70.149.52 attack
Sep  6 23:32:26 vmanager6029 postfix/smtpd\[21459\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  6 23:32:53 vmanager6029 postfix/smtpd\[21459\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-07 05:35:14

Recently Reported IPs

37.128.179.113 45.95.30.238 23.124.120.222 5.135.158.228
1.52.241.37 220.81.240.239 211.137.225.21 187.204.140.65
177.152.52.100 177.9.247.92 175.34.36.165 171.254.101.76
154.123.163.181 133.130.89.86 130.255.70.216 91.78.47.35
47.70.166.218 67.54.98.198 15.38.56.139 46.19.147.174