Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kryniczno

Region: Dolnoslaskie

Country: Poland

Internet Service Provider: Orange

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.50.151.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42773
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.50.151.9.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032701 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 28 11:28:40 CST 2025
;; MSG SIZE  rcvd: 104
Host info
9.151.50.80.in-addr.arpa domain name pointer lub-r12.tpnet.pl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.151.50.80.in-addr.arpa	name = lub-r12.tpnet.pl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.70.167.248 attackspam
Oct  1 19:04:34 auw2 sshd\[30480\]: Invalid user dinesh from 45.70.167.248
Oct  1 19:04:34 auw2 sshd\[30480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.167.248
Oct  1 19:04:36 auw2 sshd\[30480\]: Failed password for invalid user dinesh from 45.70.167.248 port 52144 ssh2
Oct  1 19:09:42 auw2 sshd\[31075\]: Invalid user hadoop from 45.70.167.248
Oct  1 19:09:42 auw2 sshd\[31075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.167.248
2019-10-02 13:58:35
196.52.43.59 attack
19/10/1@23:52:08: FAIL: IoT-SSH address from=196.52.43.59
...
2019-10-02 14:20:19
190.165.190.22 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/190.165.190.22/ 
 CO - 1H : (109)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CO 
 NAME ASN : ASN27805 
 
 IP : 190.165.190.22 
 
 CIDR : 190.165.128.0/17 
 
 PREFIX COUNT : 52 
 
 UNIQUE IP COUNT : 2105088 
 
 
 WYKRYTE ATAKI Z ASN27805 :  
  1H - 2 
  3H - 4 
  6H - 8 
 12H - 21 
 24H - 38 
 
 DateTime : 2019-10-02 05:52:52 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-02 13:50:45
149.202.238.204 attackspambots
Automatic report - XMLRPC Attack
2019-10-02 13:51:37
211.8.80.27 attackspam
Oct  2 10:17:16 our-server-hostname postfix/smtpd[546]: connect from unknown[211.8.80.27]
Oct x@x
Oct  2 10:17:19 our-server-hostname postfix/smtpd[546]: disconnect from unknown[211.8.80.27]
Oct  2 10:34:46 our-server-hostname postfix/smtpd[18837]: connect from unknown[211.8.80.27]
Oct x@x
Oct  2 10:34:53 our-server-hostname postfix/smtpd[18837]: disconnect from unknown[211.8.80.27]
Oct  2 10:35:58 our-server-hostname postfix/smtpd[18369]: connect from unknown[211.8.80.27]
Oct x@x
Oct  2 10:36:15 our-server-hostname postfix/smtpd[18369]: disconnect from unknown[211.8.80.27]
Oct  2 10:42:20 our-server-hostname postfix/smtpd[14911]: connect from unknown[211.8.80.27]
Oct x@x
Oct  2 10:42:23 our-server-hostname postfix/smtpd[14911]: disconnect from unknown[211.8.80.27]
Oct  2 11:09:28 our-server-hostname postfix/smtpd[18513]: connect from unknown[211.8.80.27]
Oct x@x
Oct  2 11:09:41 our-server-hostname postfix/smtpd[18513]: disconnect from unknown[211.8.80.27]
Oct  2 11:10:........
-------------------------------
2019-10-02 14:20:03
106.51.73.204 attackbotsspam
Oct  2 06:04:45 game-panel sshd[12461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.73.204
Oct  2 06:04:47 game-panel sshd[12461]: Failed password for invalid user password from 106.51.73.204 port 60142 ssh2
Oct  2 06:10:27 game-panel sshd[12743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.73.204
2019-10-02 14:18:05
112.121.7.115 attack
Oct  2 01:26:25 plusreed sshd[14268]: Invalid user administrator from 112.121.7.115
...
2019-10-02 13:44:30
132.145.21.100 attack
Oct  2 07:28:30 vps691689 sshd[26834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.21.100
Oct  2 07:28:32 vps691689 sshd[26834]: Failed password for invalid user Administrator from 132.145.21.100 port 46756 ssh2
...
2019-10-02 14:00:28
202.29.39.1 attack
$f2bV_matches_ltvn
2019-10-02 14:06:18
73.171.226.23 attackbotsspam
Oct  2 07:51:48 markkoudstaal sshd[32545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.171.226.23
Oct  2 07:51:50 markkoudstaal sshd[32545]: Failed password for invalid user webadmin from 73.171.226.23 port 46638 ssh2
Oct  2 07:56:09 markkoudstaal sshd[444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.171.226.23
2019-10-02 14:01:37
73.229.232.218 attack
Oct  2 05:01:30 hcbbdb sshd\[13455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-229-232-218.hsd1.co.comcast.net  user=root
Oct  2 05:01:32 hcbbdb sshd\[13455\]: Failed password for root from 73.229.232.218 port 57048 ssh2
Oct  2 05:10:12 hcbbdb sshd\[14368\]: Invalid user user1 from 73.229.232.218
Oct  2 05:10:12 hcbbdb sshd\[14368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-229-232-218.hsd1.co.comcast.net
Oct  2 05:10:15 hcbbdb sshd\[14368\]: Failed password for invalid user user1 from 73.229.232.218 port 42010 ssh2
2019-10-02 14:10:54
164.68.122.164 attackbotsspam
Oct  1 19:16:43 web1 sshd\[4167\]: Invalid user prueba from 164.68.122.164
Oct  1 19:16:43 web1 sshd\[4167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.122.164
Oct  1 19:16:44 web1 sshd\[4167\]: Failed password for invalid user prueba from 164.68.122.164 port 48478 ssh2
Oct  1 19:20:16 web1 sshd\[4461\]: Invalid user hatton from 164.68.122.164
Oct  1 19:20:16 web1 sshd\[4461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.122.164
2019-10-02 13:21:16
27.223.89.238 attackbots
Oct  2 00:58:45 TORMINT sshd\[7116\]: Invalid user mustafa from 27.223.89.238
Oct  2 00:58:45 TORMINT sshd\[7116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.223.89.238
Oct  2 00:58:47 TORMINT sshd\[7116\]: Failed password for invalid user mustafa from 27.223.89.238 port 33097 ssh2
...
2019-10-02 13:23:36
153.36.242.143 attackspambots
Oct  2 01:24:05 debian sshd\[22254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Oct  2 01:24:07 debian sshd\[22254\]: Failed password for root from 153.36.242.143 port 61120 ssh2
Oct  2 01:24:09 debian sshd\[22254\]: Failed password for root from 153.36.242.143 port 61120 ssh2
...
2019-10-02 13:25:32
222.180.162.8 attack
Oct  2 06:48:02 www2 sshd\[30913\]: Invalid user ekimunyu123 from 222.180.162.8Oct  2 06:48:04 www2 sshd\[30913\]: Failed password for invalid user ekimunyu123 from 222.180.162.8 port 52655 ssh2Oct  2 06:52:53 www2 sshd\[31473\]: Invalid user legal from 222.180.162.8
...
2019-10-02 13:49:42

Recently Reported IPs

189.228.43.153 98.248.112.173 12.70.3.208 181.82.156.50
68.244.130.129 120.10.28.60 204.206.207.66 205.173.180.138
121.175.70.9 225.53.237.156 142.205.213.11 218.148.42.167
87.255.210.74 239.240.152.161 236.122.238.23 185.147.124.116
2600:8801:1b80:1932:290f:3d75:ad44:6e41 107.53.126.119 74.27.103.172 162.219.225.118