Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.56.74.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55742
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.56.74.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:16:26 CST 2025
;; MSG SIZE  rcvd: 104
Host info
14.74.56.80.in-addr.arpa domain name pointer f74014.upc-f.chello.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.74.56.80.in-addr.arpa	name = f74014.upc-f.chello.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.38.82.14 attackbotsspam
Jun 21 19:05:17 vps200512 sshd\[21554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14  user=root
Jun 21 19:05:19 vps200512 sshd\[21554\]: Failed password for root from 54.38.82.14 port 53600 ssh2
Jun 21 19:05:19 vps200512 sshd\[21556\]: Invalid user admin from 54.38.82.14
Jun 21 19:05:20 vps200512 sshd\[21556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14
Jun 21 19:05:21 vps200512 sshd\[21556\]: Failed password for invalid user admin from 54.38.82.14 port 49784 ssh2
2019-06-22 07:18:33
209.17.96.130 attackspam
port scan and connect, tcp 21 (ftp)
2019-06-22 07:02:51
190.203.227.233 attack
445/tcp 445/tcp
[2019-06-21]2pkt
2019-06-22 07:13:30
117.239.150.75 attack
Request: "GET /manager/html HTTP/1.1"
2019-06-22 07:08:00
201.1.81.21 attack
Request: "GET / HTTP/1.1" Request: "GET / HTTP/1.1"
2019-06-22 06:56:39
216.244.66.247 attack
20 attempts against mh-misbehave-ban on tree.magehost.pro
2019-06-22 07:10:59
177.9.183.48 attackbotsspam
8080/tcp
[2019-06-21]1pkt
2019-06-22 07:18:01
43.228.180.60 attackspam
445/tcp
[2019-06-21]1pkt
2019-06-22 06:39:32
189.110.234.88 attack
Request: "GET / HTTP/1.1"
2019-06-22 06:49:32
5.77.215.146 attackbots
445/tcp 445/tcp
[2019-06-21]2pkt
2019-06-22 06:43:57
86.122.110.122 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 06:43:30
71.6.135.131 attack
Automatic report - Web App Attack
2019-06-22 06:36:36
191.17.189.172 attack
Request: "GET / HTTP/1.1" Request: "GET / HTTP/1.1"
2019-06-22 06:45:30
77.247.110.116 attack
SIP Server BruteForce Attack
2019-06-22 06:52:34
185.156.177.44 attackbotsspam
19/6/21@15:42:45: FAIL: Alarm-Intrusion address from=185.156.177.44
...
2019-06-22 07:17:34

Recently Reported IPs

122.40.12.72 225.143.222.164 30.73.226.3 127.175.163.23
18.11.154.234 213.165.213.68 147.223.59.120 142.125.230.171
181.1.71.114 125.208.49.235 245.111.173.192 194.70.120.20
61.5.211.175 108.170.142.118 237.3.195.195 117.154.116.200
187.110.184.185 166.182.20.17 129.17.16.107 190.199.217.35