Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kyiv

Region: Kyiv City

Country: Ukraine

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.80.42.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24371
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.80.42.99.			IN	A

;; AUTHORITY SECTION:
.			554	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120201 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 03 12:29:49 CST 2019
;; MSG SIZE  rcvd: 116
Host info
99.42.80.212.in-addr.arpa domain name pointer 99-42-80-212.dhcp.homenet.adamant.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.42.80.212.in-addr.arpa	name = 99-42-80-212.dhcp.homenet.adamant.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
211.57.153.250 attackbotsspam
Invalid user remi from 211.57.153.250 port 44156
2020-08-22 19:12:11
105.244.117.201 attackspambots
Automatic report - Port Scan Attack
2020-08-22 18:57:02
80.81.18.98 attackbotsspam
Telnet Server BruteForce Attack
2020-08-22 18:42:34
91.121.104.181 attackspambots
Invalid user usuario from 91.121.104.181 port 36193
2020-08-22 19:04:22
132.232.68.26 attackspam
2020-08-22 02:22:39.370752-0500  localhost sshd[77035]: Failed password for invalid user webtest from 132.232.68.26 port 43788 ssh2
2020-08-22 18:58:17
143.255.243.127 attack
Automatic report - Port Scan Attack
2020-08-22 19:15:01
161.35.82.213 attackspam
fail2ban detected brute force
2020-08-22 19:00:45
75.130.124.90 attackspam
Invalid user stage from 75.130.124.90 port 31587
2020-08-22 18:39:52
78.36.152.186 attackspambots
Invalid user adminuser from 78.36.152.186 port 59070
2020-08-22 18:39:27
120.92.155.102 attackspam
Invalid user hc from 120.92.155.102 port 38542
2020-08-22 18:36:39
181.143.153.194 attackbots
20/8/22@04:20:27: FAIL: Alarm-Network address from=181.143.153.194
...
2020-08-22 18:55:48
68.183.193.46 attackspambots
2020-08-22T09:39:03.980367shield sshd\[18384\]: Invalid user all from 68.183.193.46 port 58682
2020-08-22T09:39:03.990211shield sshd\[18384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.46
2020-08-22T09:39:05.930579shield sshd\[18384\]: Failed password for invalid user all from 68.183.193.46 port 58682 ssh2
2020-08-22T09:42:50.839940shield sshd\[18658\]: Invalid user nagios from 68.183.193.46 port 41774
2020-08-22T09:42:50.849844shield sshd\[18658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.46
2020-08-22 19:07:02
160.153.245.175 attackspambots
Brute-force general attack.
2020-08-22 19:17:45
223.4.66.84 attackspambots
Invalid user ignacio from 223.4.66.84 port 55865
2020-08-22 18:47:16
51.15.227.83 attack
Aug 22 11:28:43 kh-dev-server sshd[28111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.227.83
...
2020-08-22 19:11:54

Recently Reported IPs

167.72.162.204 27.30.55.104 35.64.117.56 110.78.174.177
152.118.209.114 217.137.173.5 57.29.172.155 50.92.46.137
217.114.49.205 60.122.198.22 132.22.51.163 123.34.233.243
129.147.208.90 157.55.111.211 135.176.177.167 125.243.25.156
164.214.230.105 42.216.65.250 105.7.222.129 187.36.158.11