Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Buenos Aires

Region: Ciudad Autónoma de Buenos Aires

Country: Argentina

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.80.12.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.80.12.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 11:12:20 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 40.12.80.200.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.12.80.200.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.81.107.19 attack
Honeypot attack, port: 445, PTR: mx20.btplawfirm.com.
2019-11-12 20:12:15
212.12.64.194 attackbots
[portscan] Port scan
2019-11-12 20:05:57
187.188.193.211 attackbotsspam
Nov 12 11:43:10 vpn01 sshd[4981]: Failed password for backup from 187.188.193.211 port 36272 ssh2
...
2019-11-12 19:47:30
113.237.61.72 attackbotsspam
Telnet Server BruteForce Attack
2019-11-12 19:49:41
68.173.119.23 attackspambots
Automatic report - Port Scan Attack
2019-11-12 19:47:08
106.12.36.42 attackbotsspam
Nov 12 10:29:19 lnxded63 sshd[11302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.42
2019-11-12 20:09:09
104.254.92.52 attackspam
(From clifford.schoenheimer@gmail.com) Would you like to post your ad on 1000's of Advertising sites monthly? Pay one flat rate and get virtually unlimited traffic to your site forever! Get more info by visiting: http://www.postmyads.tech
2019-11-12 19:54:09
115.231.174.170 attackspambots
Nov 12 08:38:36 localhost sshd\[28641\]: Invalid user thulium from 115.231.174.170 port 47190
Nov 12 08:38:36 localhost sshd\[28641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.174.170
Nov 12 08:38:37 localhost sshd\[28641\]: Failed password for invalid user thulium from 115.231.174.170 port 47190 ssh2
Nov 12 08:44:03 localhost sshd\[28836\]: Invalid user admin from 115.231.174.170 port 37068
Nov 12 08:44:03 localhost sshd\[28836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.174.170
...
2019-11-12 20:01:03
101.88.37.52 attackbots
Nov 12 07:04:38 mail01 postfix/postscreen[9437]: CONNECT from [101.88.37.52]:61303 to [94.130.181.95]:25
Nov 12 07:04:39 mail01 postfix/dnsblog[9439]: addr 101.88.37.52 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 12 07:04:39 mail01 postfix/dnsblog[9440]: addr 101.88.37.52 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 12 07:04:44 mail01 postfix/postscreen[9437]: DNSBL rank 4 for [101.88.37.52]:61303
Nov x@x
Nov 12 07:04:46 mail01 postfix/postscreen[9437]: DISCONNECT [101.88.37.52]:61303
Nov 12 07:11:16 mail01 postfix/postscreen[9441]: CONNECT from [101.88.37.52]:58055 to [94.130.181.95]:25
Nov 12 07:11:16 mail01 postfix/dnsblog[9525]: addr 101.88.37.52 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 12 07:11:16 mail01 postfix/dnsblog[9444]: addr 101.88.37.52 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 12 07:11:22 mail01 postfix/postscreen[9441]: DNSBL rank 4 for [101.88.37.52]:58055
Nov x@x
Nov 12 07:11:24 mail01 postfix/postscreen[9441]: DISC........
-------------------------------
2019-11-12 20:03:36
125.44.20.238 attackspam
Port scan
2019-11-12 19:46:15
147.135.255.107 attack
Jul 31 12:03:33 vtv3 sshd\[11495\]: Invalid user stp from 147.135.255.107 port 50988
Jul 31 12:03:33 vtv3 sshd\[11495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.255.107
Jul 31 12:03:34 vtv3 sshd\[11495\]: Failed password for invalid user stp from 147.135.255.107 port 50988 ssh2
Jul 31 12:10:36 vtv3 sshd\[15310\]: Invalid user campbell from 147.135.255.107 port 48124
Jul 31 12:10:36 vtv3 sshd\[15310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.255.107
Jul 31 12:23:58 vtv3 sshd\[21579\]: Invalid user dvd from 147.135.255.107 port 42158
Jul 31 12:23:58 vtv3 sshd\[21579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.255.107
Jul 31 12:24:00 vtv3 sshd\[21579\]: Failed password for invalid user dvd from 147.135.255.107 port 42158 ssh2
Jul 31 12:30:41 vtv3 sshd\[25170\]: Invalid user revista from 147.135.255.107 port 38934
Jul 31 12:30:41 vtv3 sshd\
2019-11-12 20:16:07
196.50.233.110 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-12 20:17:02
140.143.4.188 attackbots
Nov 12 10:56:44 eventyay sshd[26103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.4.188
Nov 12 10:56:46 eventyay sshd[26103]: Failed password for invalid user walburn from 140.143.4.188 port 54390 ssh2
Nov 12 11:01:27 eventyay sshd[26217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.4.188
...
2019-11-12 20:14:34
92.255.95.242 attackspam
Nov 11 11:26:10 host sshd[6709]: User r.r from 92.255.95.242 not allowed because none of user's groups are listed in AllowGroups
Nov 11 11:26:10 host sshd[6709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.95.242  user=r.r
Nov 11 11:26:12 host sshd[6709]: Failed password for invalid user r.r from 92.255.95.242 port 45788 ssh2
Nov 11 11:26:12 host sshd[6709]: Received disconnect from 92.255.95.242 port 45788:11: Normal Shutdown, Thank you for playing [preauth]
Nov 11 11:26:12 host sshd[6709]: Disconnected from invalid user r.r 92.255.95.242 port 45788 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=92.255.95.242
2019-11-12 19:43:12
186.249.213.77 attack
Honeypot attack, port: 23, PTR: ip-static-186-249-213-77.iblnet.com.br.
2019-11-12 19:56:32

Recently Reported IPs

171.115.170.161 57.218.34.242 242.4.104.255 142.170.182.204
69.196.72.49 139.174.193.25 234.246.200.126 109.209.180.50
103.196.117.87 85.132.108.185 198.211.137.144 123.34.154.7
147.223.243.151 51.175.23.145 186.222.131.53 8.207.30.190
25.176.0.207 231.95.30.114 61.72.40.53 60.223.58.115