Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hungary

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.99.172.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42309
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.99.172.12.			IN	A

;; AUTHORITY SECTION:
.			466	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062500 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 25 23:23:01 CST 2022
;; MSG SIZE  rcvd: 105
Host info
12.172.99.80.in-addr.arpa domain name pointer catv-80-99-172-12.catv.fixed.vodafone.hu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.172.99.80.in-addr.arpa	name = catv-80-99-172-12.catv.fixed.vodafone.hu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.141.196 attackspam
MYH,DEF GET /wp-login.php
GET /wp-login.php
2020-04-17 02:52:47
193.112.19.70 attackbotsspam
2020-04-16T13:33:57.2808921495-001 sshd[58937]: Invalid user mp from 193.112.19.70 port 43902
2020-04-16T13:33:59.4117711495-001 sshd[58937]: Failed password for invalid user mp from 193.112.19.70 port 43902 ssh2
2020-04-16T13:37:43.4829531495-001 sshd[59062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.19.70  user=root
2020-04-16T13:37:44.9684241495-001 sshd[59062]: Failed password for root from 193.112.19.70 port 52672 ssh2
2020-04-16T13:41:29.4985961495-001 sshd[59192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.19.70  user=root
2020-04-16T13:41:31.0093971495-001 sshd[59192]: Failed password for root from 193.112.19.70 port 33202 ssh2
...
2020-04-17 03:09:39
184.105.139.97 attack
firewall-block, port(s): 1883/tcp
2020-04-17 03:07:38
106.12.10.21 attackspam
Apr 16 19:48:08 vserver sshd\[2204\]: Failed password for root from 106.12.10.21 port 39886 ssh2Apr 16 19:52:03 vserver sshd\[2217\]: Invalid user ox from 106.12.10.21Apr 16 19:52:04 vserver sshd\[2217\]: Failed password for invalid user ox from 106.12.10.21 port 33256 ssh2Apr 16 19:56:07 vserver sshd\[2239\]: Invalid user test from 106.12.10.21
...
2020-04-17 03:16:33
186.215.143.149 attackspambots
Brute forcing email accounts
2020-04-17 03:17:26
87.248.231.195 attack
Apr 16 21:14:23 nextcloud sshd\[32191\]: Invalid user ubuntu2 from 87.248.231.195
Apr 16 21:14:23 nextcloud sshd\[32191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.248.231.195
Apr 16 21:14:25 nextcloud sshd\[32191\]: Failed password for invalid user ubuntu2 from 87.248.231.195 port 37657 ssh2
2020-04-17 03:25:58
187.189.27.21 attackspam
Distributed brute force attack
2020-04-17 03:31:10
184.105.139.75 attackspambots
Port Scan: Events[1] countPorts[1]: 5555 ..
2020-04-17 03:12:05
46.249.199.13 attackspambots
Attack bad web bot
2020-04-17 02:57:27
5.196.128.177 attackspambots
Apr 16 20:35:48 markkoudstaal sshd[26007]: Failed password for root from 5.196.128.177 port 43106 ssh2
Apr 16 20:39:13 markkoudstaal sshd[26458]: Failed password for root from 5.196.128.177 port 50120 ssh2
2020-04-17 02:52:24
51.77.254.207 attack
port scan and connect, tcp 22 (ssh)
2020-04-17 03:02:04
119.84.135.143 attack
SSH Brute-Force Attack
2020-04-17 03:12:16
110.138.209.60 attackbots
Automatic report - Port Scan Attack
2020-04-17 02:53:01
192.144.199.95 attackspam
$f2bV_matches
2020-04-17 03:31:44
223.247.130.195 attackspam
Invalid user wang from 223.247.130.195 port 33685
2020-04-17 03:11:46

Recently Reported IPs

115.159.29.89 81.68.127.179 193.233.231.60 81.37.45.10
78.160.155.67 137.226.186.142 182.209.131.142 192.241.222.134
173.184.75.231 5.167.69.167 58.191.191.204 59.10.231.130
82.47.101.156 84.39.180.140 81.203.113.191 81.147.171.115
137.226.60.56 75.117.138.2 118.232.162.108 193.233.137.189