Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cedar Rapids

Region: Iowa

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.242.19.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50857
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.242.19.80.			IN	A

;; AUTHORITY SECTION:
.			10800	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 100.100.2.136#53(100.100.2.136)
;; WHEN: Thu Jan 02 21:05:10 CST 2020
;; MSG SIZE  rcvd: 117

Host info
Host 80.19.242.214.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 80.19.242.214.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
216.239.136.47 attackspam
Automatic report - XMLRPC Attack
2020-07-23 05:59:00
93.174.93.25 attackspam
2020-07-23T00:15:49.467887lavrinenko.info dovecot[5494]: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=93.174.93.25, lip=95.216.137.45
2020-07-23T00:36:56.433449lavrinenko.info dovecot[5494]: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=93.174.93.25, lip=95.216.137.45
...
2020-07-23 06:01:33
167.99.107.207 attackspam
Automatic report - XMLRPC Attack
2020-07-23 06:12:32
184.168.46.82 attackspambots
REQUESTED PAGE: /xmlrpc.php
2020-07-23 05:40:15
106.53.249.204 attack
Invalid user test from 106.53.249.204 port 10340
2020-07-23 06:08:14
89.165.75.151 attackspam
Unauthorised access (Jul 22) SRC=89.165.75.151 LEN=52 TOS=0x10 PREC=0x40 TTL=113 ID=327 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-23 06:05:05
156.19.42.138 attackspambots
Unauthorized connection attempt from IP address 156.19.42.138 on Port 445(SMB)
2020-07-23 05:34:44
157.230.53.57 attackbotsspam
07/22/2020-16:33:33.143497 157.230.53.57 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-23 05:36:57
51.77.230.147 attack
Jul 22 22:58:17 mail.srvfarm.net postfix/smtpd[1068584]: warning: vps-113fc0af.vps.ovh.net[51.77.230.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 22 22:58:17 mail.srvfarm.net postfix/smtpd[1068584]: lost connection after AUTH from vps-113fc0af.vps.ovh.net[51.77.230.147]
Jul 22 22:58:21 mail.srvfarm.net postfix/smtpd[1067650]: warning: vps-113fc0af.vps.ovh.net[51.77.230.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 22 22:58:21 mail.srvfarm.net postfix/smtpd[1071885]: warning: vps-113fc0af.vps.ovh.net[51.77.230.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 22 22:58:21 mail.srvfarm.net postfix/smtpd[1071885]: lost connection after AUTH from vps-113fc0af.vps.ovh.net[51.77.230.147]
Jul 22 22:58:21 mail.srvfarm.net postfix/smtpd[1067650]: lost connection after AUTH from vps-113fc0af.vps.ovh.net[51.77.230.147]
2020-07-23 06:02:04
168.194.13.25 attack
SSH Invalid Login
2020-07-23 05:52:53
164.132.47.139 attackspam
SSH Invalid Login
2020-07-23 06:12:51
220.135.162.228 attackspambots
Attempted connection to port 23.
2020-07-23 05:48:17
49.233.140.233 attackspambots
Fail2Ban Ban Triggered (2)
2020-07-23 05:45:16
81.88.49.27 attack
Automatic report - XMLRPC Attack
2020-07-23 05:51:10
201.138.134.211 attackspambots
SSH Brute Force
2020-07-23 05:41:11

Recently Reported IPs

47.214.58.166 79.53.189.23 76.218.88.16 68.57.81.172
187.163.215.239 163.130.219.241 130.179.63.211 107.227.230.97
118.190.121.226 178.88.202.174 183.247.191.170 50.167.145.151
105.106.145.40 121.2.231.216 122.172.235.91 161.28.251.126
74.71.183.180 52.84.214.113 60.19.14.102 47.96.91.14