Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hungary

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.99.70.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.99.70.211.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 04:30:10 CST 2025
;; MSG SIZE  rcvd: 105
Host info
211.70.99.80.in-addr.arpa domain name pointer catv-80-99-70-211.catv.fixed.one.hu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
211.70.99.80.in-addr.arpa	name = catv-80-99-70-211.catv.fixed.one.hu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
31.184.215.239 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 15 - port: 15386 proto: TCP cat: Misc Attack
2019-11-08 00:10:15
45.143.220.55 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-08 00:07:48
185.254.120.15 attackspam
Connection by 185.254.120.15 on port: 9926 got caught by honeypot at 11/7/2019 1:47:46 PM
2019-11-08 00:02:26
195.250.96.29 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-11-08 00:11:07
191.31.104.36 attack
Lines containing failures of 191.31.104.36
Nov  7 15:42:08 omfg postfix/smtpd[28948]: connect from unknown[191.31.104.36]
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=191.31.104.36
2019-11-07 23:53:48
174.138.19.114 attackbotsspam
Nov  7 22:20:19 webhost01 sshd[6262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.19.114
Nov  7 22:20:21 webhost01 sshd[6262]: Failed password for invalid user cbs from 174.138.19.114 port 46810 ssh2
...
2019-11-07 23:49:54
140.114.91.94 attackspambots
F2B jail: sshd. Time: 2019-11-07 16:57:57, Reported by: VKReport
2019-11-08 00:14:20
212.216.126.148 attackbots
Nov  6 05:28:35 cumulus sshd[27277]: Invalid user pi from 212.216.126.148 port 46440
Nov  6 05:28:35 cumulus sshd[27278]: Invalid user pi from 212.216.126.148 port 46446
Nov  6 05:28:35 cumulus sshd[27277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.216.126.148
Nov  6 05:28:35 cumulus sshd[27278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.216.126.148
Nov  6 05:28:37 cumulus sshd[27277]: Failed password for invalid user pi from 212.216.126.148 port 46440 ssh2
Nov  6 05:28:37 cumulus sshd[27278]: Failed password for invalid user pi from 212.216.126.148 port 46446 ssh2
Nov  6 05:28:37 cumulus sshd[27277]: Connection closed by 212.216.126.148 port 46440 [preauth]
Nov  6 05:28:38 cumulus sshd[27278]: Connection closed by 212.216.126.148 port 46446 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=212.216.126.148
2019-11-08 00:18:31
192.81.215.176 attackbotsspam
$f2bV_matches
2019-11-08 00:15:34
189.94.123.39 attack
SSH/22 MH Probe, BF, Hack -
2019-11-08 00:16:11
80.241.211.237 attackspambots
11/07/2019-10:49:37.645548 80.241.211.237 Protocol: 6 ET SCAN Potential SSH Scan
2019-11-07 23:50:39
185.211.245.198 attackbotsspam
Nov  7 16:24:22 mail postfix/smtpd[25425]: warning: unknown[185.211.245.198]: SASL PLAIN authentication failed: 
Nov  7 16:29:15 mail postfix/smtpd[26155]: warning: unknown[185.211.245.198]: SASL PLAIN authentication failed: 
Nov  7 16:29:44 mail postfix/smtpd[26633]: warning: unknown[185.211.245.198]: SASL PLAIN authentication failed:
2019-11-07 23:49:13
129.204.130.77 attackspambots
Nov  5 23:44:03 host2 sshd[11298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.130.77  user=r.r
Nov  5 23:44:04 host2 sshd[11298]: Failed password for r.r from 129.204.130.77 port 36500 ssh2
Nov  5 23:44:05 host2 sshd[11298]: Received disconnect from 129.204.130.77: 11: Bye Bye [preauth]
Nov  5 23:52:46 host2 sshd[9564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.130.77  user=r.r
Nov  5 23:52:48 host2 sshd[9564]: Failed password for r.r from 129.204.130.77 port 37143 ssh2
Nov  5 23:52:48 host2 sshd[9564]: Received disconnect from 129.204.130.77: 11: Bye Bye [preauth]
Nov  5 23:57:46 host2 sshd[26531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.130.77  user=r.r
Nov  5 23:57:48 host2 sshd[26531]: Failed password for r.r from 129.204.130.77 port 56430 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=12
2019-11-08 00:00:52
185.175.93.21 attack
11/07/2019-15:48:04.865818 185.175.93.21 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-07 23:43:13
182.148.100.11 attackspambots
Nov  6 06:59:42 h2040555 sshd[4136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.100.11  user=r.r
Nov  6 06:59:44 h2040555 sshd[4136]: Failed password for r.r from 182.148.100.11 port 57008 ssh2
Nov  6 06:59:44 h2040555 sshd[4136]: Received disconnect from 182.148.100.11: 11: Bye Bye [preauth]
Nov  6 07:15:17 h2040555 sshd[4346]: Invalid user ha from 182.148.100.11
Nov  6 07:15:17 h2040555 sshd[4346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.100.11 
Nov  6 07:15:19 h2040555 sshd[4346]: Failed password for invalid user ha from 182.148.100.11 port 47089 ssh2
Nov  6 07:15:19 h2040555 sshd[4346]: Received disconnect from 182.148.100.11: 11: Bye Bye [preauth]
Nov  6 07:22:12 h2040555 sshd[4428]: Invalid user winrar from 182.148.100.11
Nov  6 07:22:12 h2040555 sshd[4428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.100.........
-------------------------------
2019-11-07 23:49:40

Recently Reported IPs

103.255.105.134 226.35.141.102 236.93.100.28 157.11.190.170
241.85.210.207 19.209.110.105 157.65.91.25 153.250.219.230
74.58.61.129 39.179.61.190 242.177.210.217 243.63.190.161
3.189.141.105 238.232.69.1 52.143.214.1 50.113.170.239
244.238.0.95 12.114.199.180 94.203.185.196 157.217.93.206