Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.199.80.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26755
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.199.80.215.			IN	A

;; AUTHORITY SECTION:
.			109	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 20:20:29 CST 2022
;; MSG SIZE  rcvd: 107
Host info
215.80.199.136.in-addr.arpa domain name pointer vrlabdhcp215.uni-trier.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
215.80.199.136.in-addr.arpa	name = vrlabdhcp215.uni-trier.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
102.165.30.41 attackbotsspam
fail2ban detected bruce force on ssh iptables
2020-09-30 23:06:23
89.248.160.150 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 76 - port: 49189 proto: udp cat: Misc Attackbytes: 71
2020-09-30 23:12:01
193.254.245.162 attackbotsspam
ET SCAN Sipvicious Scan - port: 5060 proto: sip cat: Attempted Information Leakbytes: 455
2020-09-30 23:26:24
45.143.221.132 attackspambots
ET SCAN Sipvicious Scan - port: 5060 proto: sip cat: Attempted Information Leakbytes: 458
2020-09-30 23:18:31
167.248.133.69 attackspambots
 TCP (SYN) 167.248.133.69:28321 -> port 4500, len 44
2020-09-30 23:00:32
195.54.161.107 attack
ET DROP Dshield Block Listed Source group 1 - port: 40582 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:25:21
14.213.136.147 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-09-30 23:22:04
102.165.30.13 attackbotsspam
 TCP (SYN) 102.165.30.13:58679 -> port 5909, len 44
2020-09-30 23:07:02
185.193.90.54 attackbots
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-09-30 23:29:20
104.244.79.181 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 95 - port: 8080 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:04:48
103.145.13.221 attack
 UDP 103.145.13.221:5063 -> port 5060, len 438
2020-09-30 23:05:05
106.12.205.237 attack
 TCP (SYN) 106.12.205.237:56909 -> port 1544, len 44
2020-09-30 23:03:39
119.187.120.38 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 62
2020-09-30 23:02:36
190.73.45.75 attackbotsspam
Brute-force attempt banned
2020-09-30 22:55:09
195.246.57.116 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-09-30 23:24:02

Recently Reported IPs

53.124.116.46 234.34.79.135 3.162.124.166 247.177.113.29
84.125.230.152 158.108.20.208 207.68.251.246 55.250.127.182
19.160.10.178 115.48.46.101 92.84.129.193 204.43.247.57
215.147.128.104 231.190.216.199 243.220.18.57 200.55.239.152
150.33.145.132 45.148.120.149 7.122.234.231 215.4.231.162