Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ukraine

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.12.208.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19175
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.12.208.80.			IN	A

;; AUTHORITY SECTION:
.			379	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:54:38 CST 2022
;; MSG SIZE  rcvd: 106
Host info
80.208.12.217.in-addr.arpa domain name pointer ddeclpp.uaservers.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.208.12.217.in-addr.arpa	name = ddeclpp.uaservers.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.144.41.36 attack
Website hacking attempt: Wordpress admin access [wp-login.php]
2019-10-20 07:08:33
89.36.217.142 attackbots
Oct 20 00:20:12 legacy sshd[26390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.217.142
Oct 20 00:20:14 legacy sshd[26390]: Failed password for invalid user 12345 from 89.36.217.142 port 59262 ssh2
Oct 20 00:23:44 legacy sshd[26481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.217.142
...
2019-10-20 07:20:09
91.207.40.45 attack
Oct 19 23:31:06 sauna sshd[74125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.45
Oct 19 23:31:07 sauna sshd[74125]: Failed password for invalid user shree from 91.207.40.45 port 57044 ssh2
...
2019-10-20 07:06:54
52.186.168.121 attackbotsspam
Oct 20 00:25:51 vps01 sshd[2791]: Failed password for root from 52.186.168.121 port 41730 ssh2
Oct 20 00:30:03 vps01 sshd[2889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.186.168.121
2019-10-20 07:02:47
222.186.175.154 attack
Oct 19 23:03:32 marvibiene sshd[8071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Oct 19 23:03:34 marvibiene sshd[8071]: Failed password for root from 222.186.175.154 port 18762 ssh2
Oct 19 23:03:38 marvibiene sshd[8071]: Failed password for root from 222.186.175.154 port 18762 ssh2
Oct 19 23:03:32 marvibiene sshd[8071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Oct 19 23:03:34 marvibiene sshd[8071]: Failed password for root from 222.186.175.154 port 18762 ssh2
Oct 19 23:03:38 marvibiene sshd[8071]: Failed password for root from 222.186.175.154 port 18762 ssh2
...
2019-10-20 07:05:30
60.174.164.45 attack
Automatic report - Banned IP Access
2019-10-20 07:33:15
94.68.35.163 attackspam
Automatic report - Port Scan Attack
2019-10-20 07:14:14
212.64.56.177 attack
2019-10-19T22:59:44.033232homeassistant sshd[22864]: Invalid user airquality from 212.64.56.177 port 50610
2019-10-19T22:59:44.043326homeassistant sshd[22864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.56.177
...
2019-10-20 07:26:23
93.137.203.150 attack
Invalid user mobil from 93.137.203.150 port 33782
2019-10-20 07:16:38
222.186.173.201 attackspam
Oct 20 01:01:00 Ubuntu-1404-trusty-64-minimal sshd\[18732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
Oct 20 01:01:03 Ubuntu-1404-trusty-64-minimal sshd\[18732\]: Failed password for root from 222.186.173.201 port 42096 ssh2
Oct 20 01:01:27 Ubuntu-1404-trusty-64-minimal sshd\[18934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
Oct 20 01:01:28 Ubuntu-1404-trusty-64-minimal sshd\[18934\]: Failed password for root from 222.186.173.201 port 21700 ssh2
Oct 20 01:01:58 Ubuntu-1404-trusty-64-minimal sshd\[19060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
2019-10-20 07:05:56
104.131.55.236 attackspam
SSH-BruteForce
2019-10-20 07:10:26
188.165.130.148 attack
Looking for resource vulnerabilities
2019-10-20 07:19:06
222.180.199.138 attackspambots
Invalid user user from 222.180.199.138 port 22274
2019-10-20 06:57:39
83.221.222.251 attack
Oct 19 22:27:56 ip-172-31-62-245 sshd\[1663\]: Invalid user teamspeakteamspeak from 83.221.222.251\
Oct 19 22:27:57 ip-172-31-62-245 sshd\[1663\]: Failed password for invalid user teamspeakteamspeak from 83.221.222.251 port 57136 ssh2\
Oct 19 22:32:44 ip-172-31-62-245 sshd\[1676\]: Invalid user P@ssword from 83.221.222.251\
Oct 19 22:32:46 ip-172-31-62-245 sshd\[1676\]: Failed password for invalid user P@ssword from 83.221.222.251 port 36422 ssh2\
Oct 19 22:37:30 ip-172-31-62-245 sshd\[1701\]: Invalid user lk from 83.221.222.251\
2019-10-20 07:05:15
193.112.174.67 attackbots
Oct 19 22:59:36 legacy sshd[23493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.174.67
Oct 19 22:59:38 legacy sshd[23493]: Failed password for invalid user Google123 from 193.112.174.67 port 44326 ssh2
Oct 19 23:03:51 legacy sshd[23689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.174.67
...
2019-10-20 07:22:36

Recently Reported IPs

217.12.208.29 217.12.208.67 217.12.209.29 217.12.209.208
217.12.22.237 217.12.209.87 217.12.30.58 217.12.209.88
217.12.97.114 217.124.154.1 217.12.241.3 217.124.154.78
217.12.24.33 217.127.50.210 217.129.209.166 217.128.212.123
217.128.67.14 217.13.104.90 217.126.9.88 217.129.233.227