Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: FiberSunucu internet Hizmetleri Ugur Pala

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
" "
2020-01-16 13:21:05
attackspambots
Unauthorized connection attempt detected from IP address 80.93.210.82 to port 445
2019-12-30 04:59:49
attackbots
Unauthorized connection attempt detected from IP address 80.93.210.82 to port 445
2019-12-29 09:07:18
attackbotsspam
Unauthorised access (Oct  2) SRC=80.93.210.82 LEN=40 TTL=238 ID=4443 TCP DPT=445 WINDOW=1024 SYN
2019-10-02 16:09:48
attack
445/tcp 445/tcp 445/tcp...
[2019-07-12/09-08]8pkt,1pt.(tcp)
2019-09-08 16:54:02
attack
Unauthorized connection attempt from IP address 80.93.210.82 on Port 445(SMB)
2019-06-26 09:29:09
Comments on same subnet:
IP Type Details Datetime
80.93.210.202 attack
Unauthorized connection attempt detected from IP address 80.93.210.202 to port 10965
2020-04-23 20:12:05
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.93.210.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6309
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.93.210.82.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 16:47:49 CST 2019
;; MSG SIZE  rcvd: 116

Host info
82.210.93.80.in-addr.arpa domain name pointer static-80-93-210-82.fibersunucu.com.tr.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
82.210.93.80.in-addr.arpa	name = static-80-93-210-82.fibersunucu.com.tr.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
195.54.160.180 attackbots
SSH-BruteForce
2020-09-17 12:23:22
222.186.180.6 attackbots
Sep 17 04:48:04 IngegnereFirenze sshd[17975]: User root from 222.186.180.6 not allowed because not listed in AllowUsers
...
2020-09-17 12:50:29
197.49.109.98 attackspambots
DATE:2020-09-16 19:00:22, IP:197.49.109.98, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-17 12:39:06
113.252.189.174 attackbotsspam
Sep 16 14:02:16 logopedia-1vcpu-1gb-nyc1-01 sshd[353529]: Failed password for root from 113.252.189.174 port 53225 ssh2
...
2020-09-17 12:18:28
185.201.89.202 attackspambots
Honeypot attack, port: 445, PTR: 185x201x89x202.nat.perm.1enter.net.
2020-09-17 12:37:43
220.142.106.217 attack
Sep 16 17:01:29 ssh2 sshd[64126]: User root from 220-142-106-217.dynamic-ip.hinet.net not allowed because not listed in AllowUsers
Sep 16 17:01:29 ssh2 sshd[64126]: Failed password for invalid user root from 220.142.106.217 port 56053 ssh2
Sep 16 17:01:30 ssh2 sshd[64126]: Connection closed by invalid user root 220.142.106.217 port 56053 [preauth]
...
2020-09-17 12:34:55
103.211.20.205 attack
Unauthorized connection attempt from IP address 103.211.20.205 on Port 445(SMB)
2020-09-17 12:26:21
201.151.150.125 attackspam
Unauthorized connection attempt from IP address 201.151.150.125 on Port 445(SMB)
2020-09-17 12:16:06
118.89.48.148 attack
20 attempts against mh-ssh on pcx
2020-09-17 12:27:29
89.107.195.138 attackbotsspam
Unauthorized connection attempt from IP address 89.107.195.138 on Port 445(SMB)
2020-09-17 12:19:20
212.45.22.194 attackspambots
Unauthorized connection attempt from IP address 212.45.22.194 on Port 445(SMB)
2020-09-17 12:35:23
223.16.34.244 attack
Sep 16 18:14:27 ssh2 sshd[65630]: Invalid user user from 223.16.34.244 port 32929
Sep 16 18:14:28 ssh2 sshd[65630]: Failed password for invalid user user from 223.16.34.244 port 32929 ssh2
Sep 16 18:14:28 ssh2 sshd[65630]: Connection closed by invalid user user 223.16.34.244 port 32929 [preauth]
...
2020-09-17 12:34:36
219.78.103.182 attack
Sep 17 00:02:39 vps639187 sshd\[5853\]: Invalid user support from 219.78.103.182 port 53410
Sep 17 00:02:39 vps639187 sshd\[5853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.78.103.182
Sep 17 00:02:40 vps639187 sshd\[5853\]: Failed password for invalid user support from 219.78.103.182 port 53410 ssh2
...
2020-09-17 12:50:56
106.13.126.15 attack
Sep 17 03:45:37 vps647732 sshd[16333]: Failed password for root from 106.13.126.15 port 60510 ssh2
...
2020-09-17 12:25:54
117.3.141.49 attackbotsspam
Unauthorized connection attempt from IP address 117.3.141.49 on Port 445(SMB)
2020-09-17 12:36:00

Recently Reported IPs

138.216.229.64 115.216.58.144 114.142.219.243 169.237.97.65
79.94.209.23 103.215.194.186 109.87.191.32 112.140.187.98
107.170.192.236 77.247.110.45 104.152.52.32 103.28.38.21
130.193.226.166 103.255.176.201 95.105.40.162 91.210.147.153
27.189.251.86 141.8.142.176 182.241.195.160 23.237.122.122