Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Budapest

Region: Budapest

Country: Hungary

Internet Service Provider: unknown

Hostname: unknown

Organization: Liberty Global B.V.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.99.202.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40447
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.99.202.45.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080902 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 10 02:26:15 CST 2019
;; MSG SIZE  rcvd: 116
Host info
45.202.99.80.in-addr.arpa domain name pointer catv-80-99-202-45.catv.broadband.hu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
45.202.99.80.in-addr.arpa	name = catv-80-99-202-45.catv.broadband.hu.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
79.137.82.213 attackspambots
Dec 10 21:37:32 cp sshd[7245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213
2019-12-11 08:08:52
157.230.133.15 attackbotsspam
Dec 10 21:41:25 sip sshd[28931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.133.15
Dec 10 21:41:27 sip sshd[28931]: Failed password for invalid user test from 157.230.133.15 port 40924 ssh2
Dec 10 21:49:10 sip sshd[28993]: Failed password for root from 157.230.133.15 port 53704 ssh2
2019-12-11 08:10:04
189.112.123.157 attackspambots
Unauthorized connection attempt from IP address 189.112.123.157 on Port 445(SMB)
2019-12-11 07:58:44
190.74.197.70 attack
Unauthorized connection attempt from IP address 190.74.197.70 on Port 445(SMB)
2019-12-11 07:56:38
117.232.127.50 attackspam
Invalid user guest from 117.232.127.50 port 38248
2019-12-11 08:00:43
139.155.29.190 attackspambots
Invalid user marilena from 139.155.29.190 port 48566
2019-12-11 07:38:47
54.39.44.47 attack
Dec 11 00:25:00 herz-der-gamer sshd[15088]: Invalid user gdm from 54.39.44.47 port 50496
...
2019-12-11 07:37:47
222.186.190.92 attack
Dec 10 14:01:42 hanapaa sshd\[355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92  user=root
Dec 10 14:01:44 hanapaa sshd\[355\]: Failed password for root from 222.186.190.92 port 14836 ssh2
Dec 10 14:01:48 hanapaa sshd\[355\]: Failed password for root from 222.186.190.92 port 14836 ssh2
Dec 10 14:01:50 hanapaa sshd\[355\]: Failed password for root from 222.186.190.92 port 14836 ssh2
Dec 10 14:01:59 hanapaa sshd\[390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92  user=root
2019-12-11 08:04:10
212.64.54.49 attackspam
SSH-BruteForce
2019-12-11 07:55:50
213.6.172.134 attack
12/10/2019-22:07:12.995872 213.6.172.134 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 20
2019-12-11 07:34:26
113.170.126.224 attackbots
Unauthorized connection attempt from IP address 113.170.126.224 on Port 445(SMB)
2019-12-11 08:06:06
218.255.15.121 attack
RDP brute forcing (d)
2019-12-11 07:55:19
190.111.224.100 attackbots
Unauthorized connection attempt detected from IP address 190.111.224.100 to port 445
2019-12-11 07:54:06
107.170.63.221 attackspambots
Dec 10 20:41:51 MK-Soft-Root2 sshd[13122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.63.221 
Dec 10 20:41:53 MK-Soft-Root2 sshd[13122]: Failed password for invalid user tk123 from 107.170.63.221 port 38730 ssh2
...
2019-12-11 07:37:18
45.82.153.140 attackspambots
Brute force attack stopped by firewall
2019-12-11 07:52:56

Recently Reported IPs

142.161.32.250 68.97.95.185 98.52.42.41 74.40.131.229
128.145.102.87 128.214.27.231 88.121.51.119 188.156.180.132
17.208.142.175 150.131.155.16 106.85.7.193 106.134.192.13
45.114.166.87 78.74.184.132 125.229.89.245 186.232.14.240
65.133.155.34 122.48.255.242 176.123.20.91 163.172.218.246