Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Darwin

Region: Northern Territory

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: Charles Darwin University

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.80.2.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15048
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.80.2.67.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 18 00:35:56 CST 2019
;; MSG SIZE  rcvd: 115

Host info
67.2.80.138.in-addr.arpa domain name pointer cor12c3ap7.cdu.edu.au.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
67.2.80.138.in-addr.arpa	name = cor12c3ap7.cdu.edu.au.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.142 attackbots
12.02.2020 23:46:13 SSH access blocked by firewall
2020-02-13 07:51:10
45.125.66.181 attackbotsspam
Rude login attack (5 tries in 1d)
2020-02-13 07:43:13
188.213.49.176 attackbots
SSH Brute Force
2020-02-13 07:57:15
190.56.229.42 attack
Invalid user pms from 190.56.229.42 port 53050
2020-02-13 07:36:01
222.24.63.126 attackspam
Feb 12 23:31:30 IngegnereFirenze sshd[20234]: Failed password for invalid user test from 222.24.63.126 port 41184 ssh2
...
2020-02-13 07:37:25
190.202.234.115 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-13 07:32:20
45.125.66.83 attack
Rude login attack (5 tries in 1d)
2020-02-13 07:52:37
14.227.166.241 attackspam
Telnet/23 MH Probe, BF, Hack -
2020-02-13 07:58:03
201.204.81.50 attackbotsspam
Invalid user jzc from 201.204.81.50 port 48128
2020-02-13 07:41:34
37.49.230.22 attackbotsspam
" "
2020-02-13 07:24:34
45.125.66.165 attack
Rude login attack (5 tries in 1d)
2020-02-13 07:39:56
37.145.62.211 attackspam
1581545965 - 02/12/2020 23:19:25 Host: 37.145.62.211/37.145.62.211 Port: 445 TCP Blocked
2020-02-13 07:29:36
181.210.44.212 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-13 07:46:42
123.207.237.146 attackspam
Feb 13 01:19:09 lukav-desktop sshd\[30999\]: Invalid user fs2016 from 123.207.237.146
Feb 13 01:19:09 lukav-desktop sshd\[30999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.237.146
Feb 13 01:19:11 lukav-desktop sshd\[30999\]: Failed password for invalid user fs2016 from 123.207.237.146 port 33016 ssh2
Feb 13 01:21:11 lukav-desktop sshd\[32178\]: Invalid user gmodserver from 123.207.237.146
Feb 13 01:21:11 lukav-desktop sshd\[32178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.237.146
2020-02-13 07:53:45
80.82.70.239 attackspambots
02/13/2020-00:10:31.335463 80.82.70.239 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2020-02-13 07:23:14

Recently Reported IPs

32.180.115.194 212.228.236.121 180.139.73.185 158.230.188.212
91.93.192.100 60.251.84.64 199.238.52.121 218.47.13.85
222.60.243.49 185.56.20.15 138.237.170.111 115.72.151.18
193.129.255.127 50.148.156.223 94.97.194.173 76.151.234.127
38.223.184.36 102.123.242.131 91.65.193.28 207.13.132.30