Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.140.66.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14499
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.140.66.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 08:45:20 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 80.66.140.193.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 193.140.66.80.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
81.22.45.65 attackspam
Nov 11 19:06:31 mc1 kernel: \[4781872.512072\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=12068 PROTO=TCP SPT=45579 DPT=62308 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 11 19:07:57 mc1 kernel: \[4781958.994681\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=26963 PROTO=TCP SPT=45579 DPT=62455 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 11 19:08:18 mc1 kernel: \[4781979.349906\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=55629 PROTO=TCP SPT=45579 DPT=61979 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-12 02:26:17
128.199.170.77 attackspambots
Nov 11 06:58:44 hanapaa sshd\[27586\]: Invalid user ts from 128.199.170.77
Nov 11 06:58:44 hanapaa sshd\[27586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.170.77
Nov 11 06:58:46 hanapaa sshd\[27586\]: Failed password for invalid user ts from 128.199.170.77 port 56092 ssh2
Nov 11 07:03:05 hanapaa sshd\[27943\]: Invalid user stolon from 128.199.170.77
Nov 11 07:03:05 hanapaa sshd\[27943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.170.77
2019-11-12 02:28:42
27.76.204.103 attackspambots
port scan and connect, tcp 23 (telnet)
2019-11-12 02:14:27
222.186.173.215 attack
Nov 11 19:19:38 root sshd[22012]: Failed password for root from 222.186.173.215 port 20366 ssh2
Nov 11 19:19:41 root sshd[22012]: Failed password for root from 222.186.173.215 port 20366 ssh2
Nov 11 19:19:45 root sshd[22012]: Failed password for root from 222.186.173.215 port 20366 ssh2
Nov 11 19:19:48 root sshd[22012]: Failed password for root from 222.186.173.215 port 20366 ssh2
...
2019-11-12 02:28:22
49.234.28.54 attack
Nov 11 16:07:01 vpn01 sshd[19962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.54
Nov 11 16:07:03 vpn01 sshd[19962]: Failed password for invalid user petrella from 49.234.28.54 port 45334 ssh2
...
2019-11-12 02:30:57
212.96.34.2 attackspambots
2019-11-11T18:30:57.668032abusebot-2.cloudsearch.cf sshd\[23646\]: Invalid user admin from 212.96.34.2 port 45738
2019-11-12 02:31:26
148.70.3.199 attackbots
SSH Bruteforce
2019-11-12 02:47:33
51.68.138.143 attack
2019-11-11T17:49:15.390473  sshd[8194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.138.143  user=root
2019-11-11T17:49:17.539943  sshd[8194]: Failed password for root from 51.68.138.143 port 45836 ssh2
2019-11-11T17:52:31.304864  sshd[8227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.138.143  user=root
2019-11-11T17:52:33.694986  sshd[8227]: Failed password for root from 51.68.138.143 port 35687 ssh2
2019-11-11T17:55:56.432529  sshd[8240]: Invalid user clemence from 51.68.138.143 port 53772
...
2019-11-12 02:17:14
59.10.5.156 attack
Nov 11 19:33:45 vps666546 sshd\[30687\]: Invalid user spark from 59.10.5.156 port 54296
Nov 11 19:33:45 vps666546 sshd\[30687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.10.5.156
Nov 11 19:33:47 vps666546 sshd\[30687\]: Failed password for invalid user spark from 59.10.5.156 port 54296 ssh2
Nov 11 19:37:59 vps666546 sshd\[30851\]: Invalid user cg from 59.10.5.156 port 51356
Nov 11 19:37:59 vps666546 sshd\[30851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.10.5.156
...
2019-11-12 02:48:33
120.253.198.158 attack
port scan and connect, tcp 23 (telnet)
2019-11-12 02:22:57
51.75.248.241 attackspam
Nov 11 18:55:08 server sshd\[2013\]: Invalid user wwwrun from 51.75.248.241
Nov 11 18:55:08 server sshd\[2013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=241.ip-51-75-248.eu 
Nov 11 18:55:11 server sshd\[2013\]: Failed password for invalid user wwwrun from 51.75.248.241 port 38326 ssh2
Nov 11 18:58:42 server sshd\[2599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=241.ip-51-75-248.eu  user=sshd
Nov 11 18:58:44 server sshd\[2599\]: Failed password for sshd from 51.75.248.241 port 48232 ssh2
...
2019-11-12 02:16:13
176.67.205.250 attackbots
Automatic report - Banned IP Access
2019-11-12 02:35:31
62.4.17.32 attackspambots
Invalid user lappenkueper from 62.4.17.32 port 57244
2019-11-12 02:19:35
81.22.45.177 attack
2019-11-11T18:57:42.069419+01:00 lumpi kernel: [3317439.951747] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.177 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=37432 PROTO=TCP SPT=50526 DPT=5566 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-12 02:12:06
182.254.154.89 attackspambots
Nov 11 17:02:44 ns382633 sshd\[13580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.154.89  user=root
Nov 11 17:02:47 ns382633 sshd\[13580\]: Failed password for root from 182.254.154.89 port 33436 ssh2
Nov 11 17:16:30 ns382633 sshd\[16250\]: Invalid user muce from 182.254.154.89 port 54930
Nov 11 17:16:30 ns382633 sshd\[16250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.154.89
Nov 11 17:16:32 ns382633 sshd\[16250\]: Failed password for invalid user muce from 182.254.154.89 port 54930 ssh2
2019-11-12 02:26:42

Recently Reported IPs

65.212.193.83 212.66.122.118 245.66.36.111 227.81.106.48
160.211.207.163 255.0.236.211 22.126.170.94 139.243.146.123
80.148.243.181 20.134.42.180 147.201.154.193 195.231.173.167
174.83.60.205 38.100.254.198 207.254.30.25 127.241.2.114
106.79.210.157 242.72.21.58 149.235.169.131 239.95.39.245