Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Poland

Internet Service Provider: unknown

Hostname: unknown

Organization: Zachodniopomorski Uniwersytet Technologiczny w Szczecinie, Akademickie Centrum Informatyki

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.94.22.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5904
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.94.22.55.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 22 23:41:19 +08 2019
;; MSG SIZE  rcvd: 115

Host info
55.22.94.80.in-addr.arpa domain name pointer 22.55.wifinet.szczecin.pl.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
55.22.94.80.in-addr.arpa	name = 22.55.wifinet.szczecin.pl.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
49.234.87.24 attackspambots
Dec  1 05:54:17 localhost sshd\[26821\]: Invalid user server from 49.234.87.24
Dec  1 05:54:17 localhost sshd\[26821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.87.24
Dec  1 05:54:19 localhost sshd\[26821\]: Failed password for invalid user server from 49.234.87.24 port 55700 ssh2
Dec  1 05:57:43 localhost sshd\[26987\]: Invalid user kalt from 49.234.87.24
Dec  1 05:57:43 localhost sshd\[26987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.87.24
...
2019-12-01 13:45:22
185.234.217.241 attackbots
Nov 30 23:57:23 plusreed sshd[18078]: Invalid user 666666 from 185.234.217.241
Nov 30 23:57:25 plusreed sshd[18096]: Invalid user admin from 185.234.217.241
Nov 30 23:57:25 plusreed sshd[18095]: Invalid user admin from 185.234.217.241
Nov 30 23:57:25 plusreed sshd[18093]: Invalid user 666666 from 185.234.217.241
Nov 30 23:57:25 plusreed sshd[18094]: Invalid user 888888 from 185.234.217.241
...
2019-12-01 13:59:03
63.79.60.180 attack
Nov 28 22:32:51 *** sshd[23062]: Invalid user bilbo from 63.79.60.180
Nov 28 22:32:51 *** sshd[23062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.79.60.180 
Nov 28 22:32:53 *** sshd[23062]: Failed password for invalid user bilbo from 63.79.60.180 port 44212 ssh2
Nov 28 22:32:53 *** sshd[23062]: Received disconnect from 63.79.60.180: 11: Bye Bye [preauth]
Nov 28 22:54:47 *** sshd[24767]: Invalid user overview from 63.79.60.180
Nov 28 22:54:47 *** sshd[24767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.79.60.180 
Nov 28 22:54:50 *** sshd[24767]: Failed password for invalid user overview from 63.79.60.180 port 33442 ssh2
Nov 28 22:54:50 *** sshd[24767]: Received disconnect from 63.79.60.180: 11: Bye Bye [preauth]
Nov 28 22:58:16 *** sshd[25043]: Invalid user server from 63.79.60.180
Nov 28 22:58:16 *** sshd[25043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid........
-------------------------------
2019-12-01 13:29:44
103.10.30.207 attackbotsspam
Nov 28 19:48:28 foo sshd[827]: Invalid user guest from 103.10.30.207
Nov 28 19:48:28 foo sshd[827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.30.207 
Nov 28 19:48:30 foo sshd[827]: Failed password for invalid user guest from 103.10.30.207 port 35894 ssh2
Nov 28 19:48:30 foo sshd[827]: Received disconnect from 103.10.30.207: 11: Bye Bye [preauth]
Nov 28 19:52:42 foo sshd[845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.30.207  user=r.r
Nov 28 19:52:44 foo sshd[845]: Failed password for r.r from 103.10.30.207 port 47316 ssh2
Nov 28 19:52:44 foo sshd[845]: Received disconnect from 103.10.30.207: 11: Bye Bye [preauth]
Nov 28 19:57:33 foo sshd[873]: Invalid user debbiec from 103.10.30.207
Nov 28 19:57:33 foo sshd[873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.30.207 
Nov 28 19:57:35 foo sshd[873]: Failed password for i........
-------------------------------
2019-12-01 13:37:05
125.77.23.30 attackspambots
2019-12-01T05:53:12.324275  sshd[15404]: Invalid user oortiz from 125.77.23.30 port 44248
2019-12-01T05:53:12.338612  sshd[15404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.77.23.30
2019-12-01T05:53:12.324275  sshd[15404]: Invalid user oortiz from 125.77.23.30 port 44248
2019-12-01T05:53:14.051168  sshd[15404]: Failed password for invalid user oortiz from 125.77.23.30 port 44248 ssh2
2019-12-01T05:57:30.842538  sshd[15444]: Invalid user ricky1 from 125.77.23.30 port 48606
...
2019-12-01 13:54:38
49.88.112.69 attack
Dec  1 04:57:05 pi sshd\[4565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
Dec  1 04:57:08 pi sshd\[4565\]: Failed password for root from 49.88.112.69 port 34733 ssh2
Dec  1 04:57:10 pi sshd\[4565\]: Failed password for root from 49.88.112.69 port 34733 ssh2
Dec  1 04:57:12 pi sshd\[4565\]: Failed password for root from 49.88.112.69 port 34733 ssh2
Dec  1 04:58:03 pi sshd\[4601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
...
2019-12-01 13:33:59
50.199.94.83 attackbotsspam
Dec  1 05:57:27  sshd[16176]: Failed password for invalid user apache from 50.199.94.83 port 55872 ssh2
2019-12-01 13:36:29
119.28.222.88 attack
Repeated failed SSH attempt
2019-12-01 13:45:53
221.162.255.82 attackspam
2019-12-01T05:57:56.750499centos sshd\[20754\]: Invalid user ts3server from 221.162.255.82 port 46550
2019-12-01T05:57:56.755026centos sshd\[20754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.162.255.82
2019-12-01T05:57:58.457103centos sshd\[20754\]: Failed password for invalid user ts3server from 221.162.255.82 port 46550 ssh2
2019-12-01 13:38:38
218.92.0.133 attackbots
Dec  1 06:29:19 v22018076622670303 sshd\[24590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Dec  1 06:29:21 v22018076622670303 sshd\[24590\]: Failed password for root from 218.92.0.133 port 30077 ssh2
Dec  1 06:29:24 v22018076622670303 sshd\[24590\]: Failed password for root from 218.92.0.133 port 30077 ssh2
...
2019-12-01 13:35:30
92.222.92.114 attack
Dec  1 04:57:50 h2177944 sshd\[13939\]: Failed password for invalid user ertzgard from 92.222.92.114 port 47286 ssh2
Dec  1 05:57:58 h2177944 sshd\[17128\]: Invalid user gogol from 92.222.92.114 port 52526
Dec  1 05:57:58 h2177944 sshd\[17128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.92.114
Dec  1 05:58:00 h2177944 sshd\[17128\]: Failed password for invalid user gogol from 92.222.92.114 port 52526 ssh2
...
2019-12-01 13:40:11
193.112.91.90 attack
Dec  1 06:40:26 lnxmysql61 sshd[10049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.91.90
2019-12-01 13:40:50
222.186.175.215 attackbots
Nov 30 19:32:46 hpm sshd\[5777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Nov 30 19:32:48 hpm sshd\[5777\]: Failed password for root from 222.186.175.215 port 34596 ssh2
Nov 30 19:33:04 hpm sshd\[5817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Nov 30 19:33:06 hpm sshd\[5817\]: Failed password for root from 222.186.175.215 port 51136 ssh2
Nov 30 19:33:27 hpm sshd\[5838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
2019-12-01 13:38:12
46.101.204.20 attackspambots
Dec  1 06:44:33 markkoudstaal sshd[2037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20
Dec  1 06:44:36 markkoudstaal sshd[2037]: Failed password for invalid user ratthanan from 46.101.204.20 port 51314 ssh2
Dec  1 06:48:21 markkoudstaal sshd[2455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20
2019-12-01 13:56:46
106.54.123.84 attackspambots
Dec  1 01:54:16 firewall sshd[13833]: Invalid user teamspeak from 106.54.123.84
Dec  1 01:54:18 firewall sshd[13833]: Failed password for invalid user teamspeak from 106.54.123.84 port 52888 ssh2
Dec  1 01:58:01 firewall sshd[13915]: Invalid user iacono from 106.54.123.84
...
2019-12-01 13:35:59

Recently Reported IPs

210.228.160.174 200.53.20.146 81.120.14.217 64.41.145.118
174.210.82.177 41.232.134.14 221.139.158.206 188.152.102.103
186.153.173.204 112.167.32.216 36.75.140.132 14.250.156.89
82.152.189.91 216.21.61.166 89.172.35.231 188.214.219.6
37.223.107.31 85.33.208.78 68.110.110.156 139.88.176.34