Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Göteborg

Region: Västra Götaland

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.80.13.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;95.80.13.12.			IN	A

;; AUTHORITY SECTION:
.			340	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070103 1800 900 604800 86400

;; Query time: 142 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 02 13:57:09 CST 2020
;; MSG SIZE  rcvd: 115
Host info
12.13.80.95.in-addr.arpa domain name pointer cust-95-80-13-12.csbnet.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.13.80.95.in-addr.arpa	name = cust-95-80-13-12.csbnet.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.112.43.98 attack
Unauthorized connection attempt detected from IP address 190.112.43.98 to port 445
2019-12-11 14:44:15
122.152.220.161 attack
Dec 11 12:03:07 gw1 sshd[3570]: Failed password for root from 122.152.220.161 port 57552 ssh2
...
2019-12-11 15:11:03
125.166.104.114 attack
Unauthorized connection attempt from IP address 125.166.104.114 on Port 445(SMB)
2019-12-11 15:10:28
149.202.115.157 attackbots
Dec 11 08:23:07 microserver sshd[40683]: Invalid user marturano from 149.202.115.157 port 48248
Dec 11 08:23:07 microserver sshd[40683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.115.157
Dec 11 08:23:09 microserver sshd[40683]: Failed password for invalid user marturano from 149.202.115.157 port 48248 ssh2
Dec 11 08:28:21 microserver sshd[41493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.115.157  user=root
Dec 11 08:28:23 microserver sshd[41493]: Failed password for root from 149.202.115.157 port 56998 ssh2
Dec 11 08:49:21 microserver sshd[44736]: Invalid user wanger from 149.202.115.157 port 35534
Dec 11 08:49:22 microserver sshd[44736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.115.157
Dec 11 08:49:23 microserver sshd[44736]: Failed password for invalid user wanger from 149.202.115.157 port 35534 ssh2
Dec 11 08:54:32 microserver sshd[45557]: Invali
2019-12-11 15:07:46
144.217.39.131 attackspam
2019-12-11T08:02:45.627618scmdmz1 sshd\[3946\]: Invalid user geta from 144.217.39.131 port 60436
2019-12-11T08:02:45.630752scmdmz1 sshd\[3946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip131.ip-144-217-39.net
2019-12-11T08:02:47.298499scmdmz1 sshd\[3946\]: Failed password for invalid user geta from 144.217.39.131 port 60436 ssh2
...
2019-12-11 15:08:18
36.68.5.6 attackbotsspam
Unauthorized connection attempt detected from IP address 36.68.5.6 to port 445
2019-12-11 15:19:51
206.189.114.0 attackspam
2019-12-11T06:30:40.100216abusebot-5.cloudsearch.cf sshd\[5523\]: Invalid user codd from 206.189.114.0 port 48388
2019-12-11 14:42:25
49.88.112.55 attackbots
2019-12-11T07:14:48.889907abusebot-5.cloudsearch.cf sshd\[7357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
2019-12-11 15:18:55
185.84.66.227 attack
Dec 11 07:24:59 vps691689 sshd[7891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.84.66.227
Dec 11 07:25:01 vps691689 sshd[7891]: Failed password for invalid user hossain from 185.84.66.227 port 49292 ssh2
Dec 11 07:30:36 vps691689 sshd[8054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.84.66.227
...
2019-12-11 14:45:31
188.125.43.160 attack
Automatic report - Banned IP Access
2019-12-11 15:04:48
82.200.226.226 attack
Dec 11 07:30:03 fr01 sshd[16405]: Invalid user geologi from 82.200.226.226
Dec 11 07:30:03 fr01 sshd[16405]: Invalid user geologi from 82.200.226.226
Dec 11 07:30:03 fr01 sshd[16405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.200.226.226
Dec 11 07:30:03 fr01 sshd[16405]: Invalid user geologi from 82.200.226.226
Dec 11 07:30:05 fr01 sshd[16405]: Failed password for invalid user geologi from 82.200.226.226 port 57898 ssh2
...
2019-12-11 15:15:35
218.92.0.211 attackspam
Dec 11 06:54:25 zeus sshd[23679]: Failed password for root from 218.92.0.211 port 58966 ssh2
Dec 11 06:54:28 zeus sshd[23679]: Failed password for root from 218.92.0.211 port 58966 ssh2
Dec 11 06:54:31 zeus sshd[23679]: Failed password for root from 218.92.0.211 port 58966 ssh2
Dec 11 06:56:03 zeus sshd[23723]: Failed password for root from 218.92.0.211 port 28127 ssh2
2019-12-11 15:01:49
123.148.218.191 attackspam
xmlrpc attack
2019-12-11 15:10:41
118.24.201.168 attack
Invalid user user1 from 118.24.201.168 port 54776
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.201.168
Failed password for invalid user user1 from 118.24.201.168 port 54776 ssh2
Invalid user tracee from 118.24.201.168 port 58158
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.201.168
2019-12-11 14:47:50
37.59.6.106 attackspambots
Dec 11 07:30:19 vpn01 sshd[17413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.6.106
Dec 11 07:30:21 vpn01 sshd[17413]: Failed password for invalid user ooooooooo from 37.59.6.106 port 43972 ssh2
...
2019-12-11 14:59:28

Recently Reported IPs

14.41.242.240 116.69.25.216 34.64.218.172 191.115.62.138
11.182.37.159 132.227.159.149 165.247.218.66 125.252.125.32
171.50.170.183 119.125.203.229 101.213.200.6 178.37.32.39
209.225.71.169 46.144.19.54 66.70.91.67 137.141.243.54
104.44.236.131 148.106.166.222 12.10.74.200 85.134.42.104