Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.80.109.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54431
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.80.109.238.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:33:29 CST 2025
;; MSG SIZE  rcvd: 105
Host info
238.109.80.2.in-addr.arpa domain name pointer bl19-109-238.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
238.109.80.2.in-addr.arpa	name = bl19-109-238.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
210.210.165.45 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-09-30 22:56:03
213.32.91.37 attackspam
Sep 30 17:05:08 SilenceServices sshd[17147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.91.37
Sep 30 17:05:10 SilenceServices sshd[17147]: Failed password for invalid user eprcuser from 213.32.91.37 port 47000 ssh2
Sep 30 17:09:10 SilenceServices sshd[18217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.91.37
2019-09-30 23:17:00
82.138.61.58 attackbots
445/tcp 445/tcp 445/tcp...
[2019-08-01/09-30]11pkt,1pt.(tcp)
2019-09-30 23:03:12
197.60.14.1 attackspambots
Sep 30 14:15:11 saschabauer sshd[15463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.60.14.1
Sep 30 14:15:14 saschabauer sshd[15463]: Failed password for invalid user admin from 197.60.14.1 port 50048 ssh2
2019-09-30 23:05:32
104.211.113.93 attackbotsspam
(sshd) Failed SSH login from 104.211.113.93 (IN/India/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep 30 08:15:30 host sshd[28507]: Invalid user bot from 104.211.113.93 port 56705
2019-09-30 22:42:47
49.88.112.80 attackspambots
Sep 30 14:49:30 venus sshd\[29216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.80  user=root
Sep 30 14:49:32 venus sshd\[29216\]: Failed password for root from 49.88.112.80 port 24235 ssh2
Sep 30 14:49:35 venus sshd\[29216\]: Failed password for root from 49.88.112.80 port 24235 ssh2
...
2019-09-30 22:53:16
106.12.198.232 attackspambots
Sep 30 20:02:34 areeb-Workstation sshd[3960]: Failed password for root from 106.12.198.232 port 52824 ssh2
...
2019-09-30 23:02:41
196.203.31.154 attackbotsspam
Sep 30 16:47:33 vps01 sshd[14420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.203.31.154
Sep 30 16:47:35 vps01 sshd[14420]: Failed password for invalid user castis from 196.203.31.154 port 56347 ssh2
2019-09-30 23:05:55
202.88.244.129 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-09-30 23:18:19
104.248.81.104 attack
09/30/2019-16:24:30.409156 104.248.81.104 Protocol: 6 ET CHAT IRC PING command
2019-09-30 23:01:34
23.129.64.151 attackbots
Sep 30 14:36:54 thevastnessof sshd[6705]: Failed password for root from 23.129.64.151 port 59476 ssh2
...
2019-09-30 22:56:30
92.63.194.90 attack
Sep 30 17:20:49 localhost sshd\[17991\]: Invalid user admin from 92.63.194.90 port 39768
Sep 30 17:20:49 localhost sshd\[17991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90
Sep 30 17:20:51 localhost sshd\[17991\]: Failed password for invalid user admin from 92.63.194.90 port 39768 ssh2
2019-09-30 23:28:50
45.142.195.5 attack
Sep 30 16:35:19 mail postfix/smtpd\[28316\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 30 16:36:17 mail postfix/smtpd\[28288\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 30 16:37:15 mail postfix/smtpd\[28316\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-30 22:47:14
120.36.2.217 attackbotsspam
Sep 30 16:59:13 dedicated sshd[25625]: Invalid user postfix from 120.36.2.217 port 58181
2019-09-30 23:13:38
51.68.189.69 attackbotsspam
Sep 30 17:16:48 SilenceServices sshd[20426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.189.69
Sep 30 17:16:51 SilenceServices sshd[20426]: Failed password for invalid user ellacoya from 51.68.189.69 port 59797 ssh2
Sep 30 17:20:58 SilenceServices sshd[21543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.189.69
2019-09-30 23:21:54

Recently Reported IPs

216.176.71.211 184.97.91.97 21.46.228.124 235.74.143.106
224.51.123.52 28.23.36.157 96.142.240.180 73.240.211.223
165.48.159.47 168.82.186.138 178.172.131.61 238.189.142.67
97.67.182.151 127.182.57.66 236.192.78.23 174.10.96.195
249.110.23.207 3.8.186.11 178.150.224.165 35.27.43.234