Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Darwin

Region: Northern Territory

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.80.99.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.80.99.205.			IN	A

;; AUTHORITY SECTION:
.			303	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021501 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 05:38:40 CST 2020
;; MSG SIZE  rcvd: 117
Host info
205.99.80.138.in-addr.arpa domain name pointer 138_80_99_205.cdu.edu.au.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
205.99.80.138.in-addr.arpa	name = 138_80_99_205.cdu.edu.au.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.171 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.171  user=root
Failed password for root from 112.85.42.171 port 2706 ssh2
Failed password for root from 112.85.42.171 port 2706 ssh2
Failed password for root from 112.85.42.171 port 2706 ssh2
Failed password for root from 112.85.42.171 port 2706 ssh2
2019-06-26 08:09:20
119.236.86.149 attackbotsspam
5555/tcp
[2019-06-25]1pkt
2019-06-26 08:29:10
112.85.42.178 attack
SSH Bruteforce attack
2019-06-26 08:06:41
1.160.197.21 attackbots
37215/tcp
[2019-06-25]1pkt
2019-06-26 08:31:45
35.233.104.145 attack
8883/tcp
[2019-06-25]1pkt
2019-06-26 08:43:40
35.247.137.39 attackspambots
Unauthorised access (Jun 25) SRC=35.247.137.39 LEN=40 TTL=57 ID=20675 TCP DPT=8080 WINDOW=64202 SYN 
Unauthorised access (Jun 25) SRC=35.247.137.39 LEN=40 TTL=57 ID=51000 TCP DPT=8080 WINDOW=54069 SYN
2019-06-26 08:40:29
196.52.43.90 attack
3000/tcp 23/tcp 389/tcp...
[2019-04-25/06-25]75pkt,38pt.(tcp),8pt.(udp)
2019-06-26 08:36:38
202.126.208.122 attackbots
2019-06-25T21:40:37.780334test01.cajus.name sshd\[3240\]: Invalid user 123 from 202.126.208.122 port 43246
2019-06-25T21:40:37.803067test01.cajus.name sshd\[3240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.126.208.122
2019-06-25T21:40:39.916547test01.cajus.name sshd\[3240\]: Failed password for invalid user 123 from 202.126.208.122 port 43246 ssh2
2019-06-26 08:29:40
141.170.128.190 attack
23/tcp
[2019-06-25]1pkt
2019-06-26 08:15:49
222.98.37.25 attackbotsspam
2019-06-25T18:37:33.911637abusebot-8.cloudsearch.cf sshd\[22397\]: Invalid user wordpress from 222.98.37.25 port 34413
2019-06-26 08:20:17
177.47.248.221 attackbotsspam
37215/tcp
[2019-06-25]1pkt
2019-06-26 08:16:50
181.174.49.130 attackbots
37215/tcp
[2019-06-25]1pkt
2019-06-26 08:21:54
37.189.70.118 attack
2019-06-25T21:46:26.858881scmdmz1 sshd\[4008\]: Invalid user nei from 37.189.70.118 port 36382
2019-06-25T21:46:26.861708scmdmz1 sshd\[4008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.189.70.118
2019-06-25T21:46:28.880924scmdmz1 sshd\[4008\]: Failed password for invalid user nei from 37.189.70.118 port 36382 ssh2
...
2019-06-26 08:09:52
200.169.4.242 attackbots
SMTP-sasl brute force
...
2019-06-26 08:11:10
114.112.81.180 attackbotsspam
Jun 25 22:28:06 ncomp sshd[4478]: Invalid user rb from 114.112.81.180
Jun 25 22:28:06 ncomp sshd[4478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.112.81.180
Jun 25 22:28:06 ncomp sshd[4478]: Invalid user rb from 114.112.81.180
Jun 25 22:28:08 ncomp sshd[4478]: Failed password for invalid user rb from 114.112.81.180 port 50216 ssh2
2019-06-26 08:02:48

Recently Reported IPs

200.202.28.8 182.151.132.88 50.199.45.224 162.243.129.17
74.74.131.78 3.217.141.169 104.190.120.174 83.71.5.41
114.99.15.164 201.235.144.66 197.168.144.254 126.222.131.13
207.12.161.59 79.141.66.126 69.149.95.228 76.14.197.223
14.156.143.106 176.131.177.230 210.59.78.10 174.250.181.39