Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: Satnetcom Balikpapan

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
RDP Brute-Force (Grieskirchen RZ1)
2020-02-22 23:25:54
Comments on same subnet:
IP Type Details Datetime
203.80.13.214 attackspam
ID_MNT-APJII-ID_<177>1579120315 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 203.80.13.214:52984
2020-01-16 05:19:43
203.80.136.133 attack
ICMP MH Probe, Scan /Distributed -
2019-11-16 04:33:03
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.80.13.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64577
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;203.80.13.234.			IN	A

;; AUTHORITY SECTION:
.			496	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022102 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 23:25:45 CST 2020
;; MSG SIZE  rcvd: 117
Host info
234.13.80.203.in-addr.arpa domain name pointer pds-svr1.satnetcom.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
234.13.80.203.in-addr.arpa	name = pds-svr1.satnetcom.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.14.224.186 attack
Unauthorized connection attempt detected from IP address 45.14.224.186 to port 23
2020-06-29 03:22:23
191.240.205.95 attack
Unauthorized connection attempt detected from IP address 191.240.205.95 to port 23
2020-06-29 03:12:41
62.194.71.156 attack
Unauthorized connection attempt detected from IP address 62.194.71.156 to port 5555
2020-06-29 03:20:43
111.229.228.88 attackspambots
Unauthorized connection attempt detected from IP address 111.229.228.88 to port 23
2020-06-29 03:36:34
72.14.86.126 attack
Unauthorized connection attempt detected from IP address 72.14.86.126 to port 23
2020-06-29 03:39:44
114.233.34.162 attack
Unauthorized connection attempt detected from IP address 114.233.34.162 to port 23
2020-06-29 03:17:24
220.81.32.94 attackbotsspam
Unauthorized connection attempt detected from IP address 220.81.32.94 to port 23
2020-06-29 03:24:44
178.209.66.216 attack
Unauthorized connection attempt detected from IP address 178.209.66.216 to port 80
2020-06-29 03:29:20
83.97.20.29 attack
Unauthorized connection attempt detected from IP address 83.97.20.29 to port 80
2020-06-29 03:02:04
183.157.169.208 attack
Unauthorised access (Jun 28) SRC=183.157.169.208 LEN=40 TTL=53 ID=3025 TCP DPT=23 WINDOW=52459 SYN
2020-06-29 03:27:56
85.14.11.10 attackspam
Unauthorized connection attempt detected from IP address 85.14.11.10 to port 8080
2020-06-29 03:38:59
183.136.225.45 attackbotsspam
Jun 28 19:30:18 [host] kernel: [9993399.020484] [U
Jun 28 19:30:21 [host] kernel: [9993401.780785] [U
Jun 28 19:32:49 [host] kernel: [9993549.931091] [U
Jun 28 19:56:19 [host] kernel: [9994959.029400] [U
Jun 28 20:17:10 [host] kernel: [9996209.713789] [U
Jun 28 20:22:49 [host] kernel: [9996549.209221] [U
2020-06-29 03:28:13
122.51.191.168 attackspam
$f2bV_matches
2020-06-29 03:34:08
112.126.59.146 attackspam
Unauthorized connection attempt detected from IP address 112.126.59.146 to port 12999
2020-06-29 03:17:48
177.170.50.76 attack
Unauthorized connection attempt detected from IP address 177.170.50.76 to port 23
2020-06-29 03:14:05

Recently Reported IPs

79.186.132.231 87.103.115.142 58.245.86.237 190.72.40.170
114.34.123.158 89.133.233.112 188.174.171.57 125.25.147.21
173.248.176.102 89.182.144.162 200.89.178.228 40.97.161.237
93.103.239.89 40.123.35.230 6.11.179.3 130.185.108.151
216.170.114.214 180.97.74.137 163.53.75.251 74.177.67.0