Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Póvoa de Varzim

Region: Porto

Country: Portugal

Internet Service Provider: NOS

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.132.80.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36359
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.132.80.72.			IN	A

;; AUTHORITY SECTION:
.			222	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071301 1800 900 604800 86400

;; Query time: 233 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 14 08:09:42 CST 2020
;; MSG SIZE  rcvd: 116
Host info
72.80.132.94.in-addr.arpa domain name pointer a94-132-80-72.cpe.netcabo.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.80.132.94.in-addr.arpa	name = a94-132-80-72.cpe.netcabo.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.105.238.245 attackspam
unauthorized connection attempt
2020-01-28 18:57:13
2.7.154.44 attackbotsspam
unauthorized connection attempt
2020-01-28 19:03:43
220.186.176.104 attackbots
unauthorized connection attempt
2020-01-28 18:30:58
41.76.169.8 attack
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(01281211)
2020-01-28 18:41:56
36.229.37.97 attackbots
unauthorized connection attempt
2020-01-28 18:43:15
201.150.48.230 attackspambots
Unauthorized connection attempt detected from IP address 201.150.48.230 to port 80 [J]
2020-01-28 18:55:34
178.151.125.180 attack
unauthorized connection attempt
2020-01-28 19:05:25
76.233.226.106 attack
Unauthorized connection attempt detected from IP address 76.233.226.106 to port 2220 [J]
2020-01-28 18:28:38
41.76.169.43 attackspambots
Jan 28 08:10:35 tuxlinux sshd[22122]: Invalid user kr from 41.76.169.43 port 44230
Jan 28 08:10:35 tuxlinux sshd[22122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.169.43 
Jan 28 08:10:35 tuxlinux sshd[22122]: Invalid user kr from 41.76.169.43 port 44230
Jan 28 08:10:35 tuxlinux sshd[22122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.169.43 
Jan 28 08:10:35 tuxlinux sshd[22122]: Invalid user kr from 41.76.169.43 port 44230
Jan 28 08:10:35 tuxlinux sshd[22122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.169.43 
Jan 28 08:10:37 tuxlinux sshd[22122]: Failed password for invalid user kr from 41.76.169.43 port 44230 ssh2
...
2020-01-28 18:25:08
103.54.13.2 attack
unauthorized connection attempt
2020-01-28 18:39:10
212.45.86.173 attack
unauthorized connection attempt
2020-01-28 18:26:14
118.70.67.156 attackspam
unauthorized connection attempt
2020-01-28 18:36:01
187.177.43.138 attack
unauthorized connection attempt
2020-01-28 18:56:43
102.65.189.136 attack
unauthorized connection attempt
2020-01-28 18:39:39
68.183.55.115 attack
Automated report (2020-01-28T09:59:09+00:00). Spambot detected.
2020-01-28 18:28:56

Recently Reported IPs

189.140.98.24 95.193.205.71 80.60.243.82 44.237.246.248
32.117.252.30 119.45.151.170 70.135.141.244 189.183.148.43
12.95.63.22 196.140.146.86 218.1.136.142 37.213.126.189
120.14.172.219 126.188.213.122 199.19.225.236 149.166.252.53
222.53.221.48 1.227.1.195 197.210.200.216 45.235.18.23