Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.93.43.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10576
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.93.43.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 04:42:42 CST 2025
;; MSG SIZE  rcvd: 105
Host info
242.43.93.80.in-addr.arpa domain name pointer 80-93-43-242.static.kufnet.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.43.93.80.in-addr.arpa	name = 80-93-43-242.static.kufnet.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
163.158.85.34 attack
" "
2019-09-13 15:04:46
59.126.149.196 attackbots
Automatic report - Banned IP Access
2019-09-13 15:44:53
106.243.162.3 attackspam
Sep 13 05:17:15 MK-Soft-VM5 sshd\[21642\]: Invalid user bserver from 106.243.162.3 port 60208
Sep 13 05:17:15 MK-Soft-VM5 sshd\[21642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.162.3
Sep 13 05:17:17 MK-Soft-VM5 sshd\[21642\]: Failed password for invalid user bserver from 106.243.162.3 port 60208 ssh2
...
2019-09-13 15:54:06
157.230.6.42 attackbots
Sep 13 05:08:38 cp sshd[11105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.6.42
2019-09-13 15:27:50
51.83.153.87 attackbotsspam
40 attacks on PHP URLs:
51.83.153.87 - - [12/Sep/2019:04:32:07 +0100] "POST /administrator/index.php HTTP/1.1" 403 9
2019-09-13 15:00:47
198.199.78.169 attackspambots
Sep 12 15:17:22 friendsofhawaii sshd\[4011\]: Invalid user vbox from 198.199.78.169
Sep 12 15:17:22 friendsofhawaii sshd\[4011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.78.169
Sep 12 15:17:23 friendsofhawaii sshd\[4011\]: Failed password for invalid user vbox from 198.199.78.169 port 44002 ssh2
Sep 12 15:23:00 friendsofhawaii sshd\[4495\]: Invalid user mysftp from 198.199.78.169
Sep 12 15:23:00 friendsofhawaii sshd\[4495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.78.169
2019-09-13 15:49:17
15.206.4.117 attack
SG - 1H : (14)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : SG 
 NAME ASN : ASN16509 
 
 IP : 15.206.4.117 
 
 CIDR : 15.206.0.0/15 
 
 PREFIX COUNT : 3006 
 
 UNIQUE IP COUNT : 26434816 
 
 
 WYKRYTE ATAKI Z ASN16509 :  
  1H - 1 
  3H - 1 
  6H - 3 
 12H - 3 
 24H - 4 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-13 15:24:53
51.158.74.14 attack
Sep 13 00:43:25 xtremcommunity sshd\[33586\]: Invalid user postgres from 51.158.74.14 port 55200
Sep 13 00:43:25 xtremcommunity sshd\[33586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.74.14
Sep 13 00:43:27 xtremcommunity sshd\[33586\]: Failed password for invalid user postgres from 51.158.74.14 port 55200 ssh2
Sep 13 00:47:22 xtremcommunity sshd\[33639\]: Invalid user weblogic from 51.158.74.14 port 41072
Sep 13 00:47:22 xtremcommunity sshd\[33639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.74.14
...
2019-09-13 15:19:28
77.40.62.94 attackspam
failed_logins
2019-09-13 15:41:40
81.145.158.178 attackbots
Sep 13 03:29:27 vps200512 sshd\[32621\]: Invalid user ClepSi from 81.145.158.178
Sep 13 03:29:27 vps200512 sshd\[32621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.145.158.178
Sep 13 03:29:29 vps200512 sshd\[32621\]: Failed password for invalid user ClepSi from 81.145.158.178 port 40352 ssh2
Sep 13 03:34:50 vps200512 sshd\[32689\]: Invalid user 123456 from 81.145.158.178
Sep 13 03:34:50 vps200512 sshd\[32689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.145.158.178
2019-09-13 15:44:11
217.182.74.125 attack
Invalid user redmine from 217.182.74.125 port 36866
2019-09-13 15:31:25
62.1.63.116 attackbotsspam
GR - 1H : (29)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GR 
 NAME ASN : ASN1241 
 
 IP : 62.1.63.116 
 
 CIDR : 62.1.48.0/20 
 
 PREFIX COUNT : 137 
 
 UNIQUE IP COUNT : 604672 
 
 
 WYKRYTE ATAKI Z ASN1241 :  
  1H - 1 
  3H - 1 
  6H - 3 
 12H - 4 
 24H - 5 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-13 15:42:15
189.237.20.171 attackspam
Automatic report - Port Scan Attack
2019-09-13 15:46:32
42.159.10.104 attackbots
Sep 13 14:07:25 webhost01 sshd[10200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.10.104
Sep 13 14:07:27 webhost01 sshd[10200]: Failed password for invalid user q1w2e3r4t5y6 from 42.159.10.104 port 58636 ssh2
...
2019-09-13 15:21:01
3.216.8.185 attack
Message ID	
Created at:	Thu, Sep 12, 2019 at 2:44 PM (Delivered after 6337 seconds)
From:	Flat Belly Diet 
To:	
Subject:	The 1 ancient & Only spice burns 1lb a day
SPF:	PASS with IP 3.216.8.185
2019-09-13 15:38:06

Recently Reported IPs

50.75.78.4 213.156.223.11 212.221.220.78 79.93.159.136
57.104.47.114 9.52.127.3 114.53.143.36 107.246.107.28
4.43.132.26 217.162.154.41 53.25.196.156 137.186.108.219
119.123.241.90 182.219.215.80 22.114.65.6 84.74.45.103
55.103.149.106 194.243.156.201 208.15.80.115 97.97.79.139