Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Olathe

Region: Kansas

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.13.2.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;172.13.2.80.			IN	A

;; AUTHORITY SECTION:
.			486	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092700 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 16:33:36 CST 2024
;; MSG SIZE  rcvd: 104
Host info
80.2.13.172.in-addr.arpa domain name pointer 172-13-2-80.lightspeed.mssnks.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.2.13.172.in-addr.arpa	name = 172-13-2-80.lightspeed.mssnks.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.90.75.213 attackbots
Dec 30 07:29:07  sshd\[25953\]: User root from 93.90.75.213 not allowed because not listed in AllowUsersDec 30 07:29:09  sshd\[25953\]: Failed password for invalid user root from 93.90.75.213 port 44676 ssh2
...
2019-12-30 16:09:52
125.161.136.112 attack
Dec 30 07:29:18 herz-der-gamer sshd[25521]: Invalid user msfadmin from 125.161.136.112 port 39739
Dec 30 07:29:18 herz-der-gamer sshd[25521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.161.136.112
Dec 30 07:29:18 herz-der-gamer sshd[25521]: Invalid user msfadmin from 125.161.136.112 port 39739
Dec 30 07:29:20 herz-der-gamer sshd[25521]: Failed password for invalid user msfadmin from 125.161.136.112 port 39739 ssh2
...
2019-12-30 16:00:47
49.247.214.67 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-12-30 16:05:20
194.150.15.70 attack
Dec 30 09:09:39 v22018076622670303 sshd\[18759\]: Invalid user guest from 194.150.15.70 port 35674
Dec 30 09:09:39 v22018076622670303 sshd\[18759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.150.15.70
Dec 30 09:09:41 v22018076622670303 sshd\[18759\]: Failed password for invalid user guest from 194.150.15.70 port 35674 ssh2
...
2019-12-30 16:13:42
182.92.235.86 attackspambots
MYH,DEF GET /_en/customer/account/login//magmi/web/info.php
2019-12-30 15:49:29
41.223.232.113 attackspambots
Dec 30 08:44:32 amit sshd\[28120\]: Invalid user mdpi from 41.223.232.113
Dec 30 08:44:32 amit sshd\[28120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.232.113
Dec 30 08:44:34 amit sshd\[28120\]: Failed password for invalid user mdpi from 41.223.232.113 port 34952 ssh2
...
2019-12-30 15:47:21
194.182.86.126 attackbotsspam
$f2bV_matches
2019-12-30 15:58:39
34.87.100.216 attack
34.87.100.216 - - [30/Dec/2019:07:18:34 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 6040 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
34.87.100.216 - - [30/Dec/2019:07:18:36 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 5770 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-30 15:42:07
83.97.20.46 attackbotsspam
Honeypot attack, port: 23, PTR: 46.20.97.83.ro.ovo.sc.
2019-12-30 15:39:19
165.227.4.106 attackspam
[Mon Dec 30 03:29:46.601650 2019] [:error] [pid 202450] [client 165.227.4.106:61000] [client 165.227.4.106] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "91"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 8)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "ws24vmsma01.ufn.edu.br"] [uri "/"] [unique_id "XgmZWl-dHLJhfZcp3W3GoAAAAAI"]
...
2019-12-30 15:43:02
95.231.76.33 attackbotsspam
"Fail2Ban detected SSH brute force attempt"
2019-12-30 15:38:50
118.239.22.22 attack
FTP Brute Force
2019-12-30 15:52:45
150.109.45.228 attack
Dec 30 03:29:38 vps46666688 sshd[2473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.45.228
Dec 30 03:29:40 vps46666688 sshd[2473]: Failed password for invalid user babs from 150.109.45.228 port 60388 ssh2
...
2019-12-30 15:48:11
106.54.24.47 attackspambots
Dec 30 03:07:02 plusreed sshd[8945]: Invalid user password0000 from 106.54.24.47
...
2019-12-30 16:07:29
106.241.16.105 attack
Dec 30 07:07:14 powerpi2 sshd[20045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.16.105
Dec 30 07:07:14 powerpi2 sshd[20045]: Invalid user guest from 106.241.16.105 port 36308
Dec 30 07:07:16 powerpi2 sshd[20045]: Failed password for invalid user guest from 106.241.16.105 port 36308 ssh2
...
2019-12-30 15:41:17

Recently Reported IPs

122.138.195.88 83.99.207.141 8.148.144.79 203.76.61.234
13.158.218.47 17.132.13.55 254.161.40.61 43.144.107.30
202.182.21.110 254.166.146.179 77.88.26.231 60.97.38.24
248.139.112.134 4.241.211.4 123.80.232.127 105.78.8.170
93.221.136.181 99.126.178.109 37.243.10.65 14.53.42.109