Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Villars-sur-Glane

Region: Fribourg

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: Bluewin

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.62.16.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57083
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.62.16.80.			IN	A

;; AUTHORITY SECTION:
.			3099	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062201 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 22 16:13:58 CST 2019
;; MSG SIZE  rcvd: 115
Host info
80.16.62.81.in-addr.arpa domain name pointer 80.16.62.81.dynamic.wline.res.cust.swisscom.ch.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
80.16.62.81.in-addr.arpa	name = 80.16.62.81.dynamic.wline.res.cust.swisscom.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.207.176.78 attackbotsspam
2020-10-01T01:39:59.832911snf-827550 sshd[28003]: Failed password for invalid user galaxy from 183.207.176.78 port 44361 ssh2
2020-10-01T01:44:15.315419snf-827550 sshd[28032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.207.176.78  user=root
2020-10-01T01:44:16.973200snf-827550 sshd[28032]: Failed password for root from 183.207.176.78 port 47483 ssh2
...
2020-10-01 07:30:47
36.103.222.105 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 16 - port: 2375 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 07:24:46
27.128.173.81 attackspambots
Oct  1 02:51:09 journals sshd\[57635\]: Invalid user ts from 27.128.173.81
Oct  1 02:51:09 journals sshd\[57635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.173.81
Oct  1 02:51:11 journals sshd\[57635\]: Failed password for invalid user ts from 27.128.173.81 port 60558 ssh2
Oct  1 02:53:11 journals sshd\[57801\]: Invalid user user14 from 27.128.173.81
Oct  1 02:53:11 journals sshd\[57801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.173.81
...
2020-10-01 07:55:45
139.217.218.93 attackspambots
2020-10-01T00:02:02.085155mail.broermann.family sshd[18923]: Failed password for invalid user user from 139.217.218.93 port 48044 ssh2
2020-10-01T00:05:20.813676mail.broermann.family sshd[19219]: Invalid user john from 139.217.218.93 port 46360
2020-10-01T00:05:20.817254mail.broermann.family sshd[19219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.218.93
2020-10-01T00:05:20.813676mail.broermann.family sshd[19219]: Invalid user john from 139.217.218.93 port 46360
2020-10-01T00:05:22.920725mail.broermann.family sshd[19219]: Failed password for invalid user john from 139.217.218.93 port 46360 ssh2
...
2020-10-01 07:34:40
45.129.33.24 attackspam
*Port Scan* detected from 45.129.33.24 (US/United States/-). 11 hits in the last 286 seconds
2020-10-01 07:22:25
157.230.163.6 attackspam
Invalid user user from 157.230.163.6 port 36752
2020-10-01 07:33:33
45.129.33.43 attackbots
scans 13 times in preceeding hours on the ports (in chronological order) 28571 28954 28599 28505 28727 28879 28604 28928 28739 28835 28974 28758 28723 resulting in total of 113 scans from 45.129.33.0/24 block.
2020-10-01 07:52:47
91.121.176.34 attack
SSH invalid-user multiple login attempts
2020-10-01 07:43:07
45.129.33.58 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 2299 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 07:52:12
45.129.33.9 attackbotsspam
 TCP (SYN) 45.129.33.9:49123 -> port 13740, len 44
2020-10-01 07:23:33
200.89.159.190 attack
Sep 30 22:34:44 pornomens sshd\[6901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.159.190  user=root
Sep 30 22:34:45 pornomens sshd\[6901\]: Failed password for root from 200.89.159.190 port 33374 ssh2
Sep 30 22:47:00 pornomens sshd\[7034\]: Invalid user dm from 200.89.159.190 port 42378
Sep 30 22:47:00 pornomens sshd\[7034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.159.190
...
2020-10-01 07:28:25
45.65.230.151 attackspambots
Sep 29 17:36:49 firewall sshd[8152]: Invalid user admin from 45.65.230.151
Sep 29 17:36:51 firewall sshd[8152]: Failed password for invalid user admin from 45.65.230.151 port 60544 ssh2
Sep 29 17:36:54 firewall sshd[8159]: Invalid user admin from 45.65.230.151
...
2020-10-01 07:53:53
45.148.121.138 attack
firewall-block, port(s): 5060/udp
2020-10-01 07:50:49
74.120.14.25 attackbots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-01 07:45:45
185.132.19.23 attack
SSH/22 MH Probe, BF, Hack -
2020-10-01 07:30:18

Recently Reported IPs

39.146.67.61 80.186.14.146 206.189.216.39 122.202.206.191
111.171.29.41 229.254.198.218 186.30.204.83 109.234.112.72
84.117.206.67 200.66.203.92 158.205.254.94 212.117.117.201
114.232.134.113 128.208.196.122 130.233.46.170 31.95.208.48
203.94.88.138 5.58.133.144 121.226.92.253 139.189.155.161