Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.212.80.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4725
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.212.80.240.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 12:54:40 CST 2025
;; MSG SIZE  rcvd: 107
Host info
240.80.212.217.in-addr.arpa domain name pointer 217-212-80-240.customer.telia.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
240.80.212.217.in-addr.arpa	name = 217-212-80-240.customer.telia.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.85.153.169 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-20 17:10:55
222.186.173.215 attackspam
Nov 20 08:52:20 hcbbdb sshd\[12944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Nov 20 08:52:22 hcbbdb sshd\[12944\]: Failed password for root from 222.186.173.215 port 23518 ssh2
Nov 20 08:52:26 hcbbdb sshd\[12944\]: Failed password for root from 222.186.173.215 port 23518 ssh2
Nov 20 08:52:39 hcbbdb sshd\[12986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Nov 20 08:52:41 hcbbdb sshd\[12986\]: Failed password for root from 222.186.173.215 port 8836 ssh2
2019-11-20 17:01:24
193.106.29.75 attackbots
2019-11-20T06:27:33Z - RDP login failed multiple times. (193.106.29.75)
2019-11-20 17:11:54
61.177.238.252 attackbotsspam
Unauthorised access (Nov 20) SRC=61.177.238.252 LEN=52 TTL=111 ID=11511 DF TCP DPT=3389 WINDOW=8192 SYN 
Unauthorised access (Nov 18) SRC=61.177.238.252 LEN=52 TTL=111 ID=8209 DF TCP DPT=3389 WINDOW=8192 SYN
2019-11-20 17:08:44
195.223.59.201 attackbots
SSH Brute Force, server-1 sshd[1329]: Failed password for bin from 195.223.59.201 port 40614 ssh2
2019-11-20 17:06:10
213.251.41.52 attack
Nov 20 10:19:04 MK-Soft-VM3 sshd[7826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.41.52 
Nov 20 10:19:07 MK-Soft-VM3 sshd[7826]: Failed password for invalid user rafael from 213.251.41.52 port 44450 ssh2
...
2019-11-20 17:20:31
49.232.60.2 attack
Nov 20 07:43:12 ip-172-31-62-245 sshd\[22532\]: Invalid user hisashi from 49.232.60.2\
Nov 20 07:43:14 ip-172-31-62-245 sshd\[22532\]: Failed password for invalid user hisashi from 49.232.60.2 port 39268 ssh2\
Nov 20 07:47:48 ip-172-31-62-245 sshd\[22551\]: Invalid user a from 49.232.60.2\
Nov 20 07:47:50 ip-172-31-62-245 sshd\[22551\]: Failed password for invalid user a from 49.232.60.2 port 37046 ssh2\
Nov 20 07:51:56 ip-172-31-62-245 sshd\[22574\]: Failed password for root from 49.232.60.2 port 34788 ssh2\
2019-11-20 16:57:37
133.242.53.230 attackbotsspam
Nov 20 07:03:26 mxgate1 postfix/postscreen[22629]: CONNECT from [133.242.53.230]:57812 to [176.31.12.44]:25
Nov 20 07:03:26 mxgate1 postfix/dnsblog[22862]: addr 133.242.53.230 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 20 07:03:32 mxgate1 postfix/postscreen[22629]: DNSBL rank 2 for [133.242.53.230]:57812
Nov x@x
Nov 20 07:03:33 mxgate1 postfix/postscreen[22629]: DISCONNECT [133.242.53.230]:57812


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=133.242.53.230
2019-11-20 17:14:46
188.68.93.39 attack
" "
2019-11-20 17:21:45
185.143.223.146 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-20 17:03:09
124.228.9.126 attack
Nov 11 02:39:19 vtv3 sshd[28738]: Failed password for invalid user vcsa from 124.228.9.126 port 54752 ssh2
Nov 11 02:43:38 vtv3 sshd[30955]: Invalid user rosman from 124.228.9.126 port 37836
Nov 11 02:43:38 vtv3 sshd[30955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.228.9.126
Nov 11 02:56:32 vtv3 sshd[5131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.228.9.126  user=uucp
Nov 11 02:56:34 vtv3 sshd[5131]: Failed password for uucp from 124.228.9.126 port 43842 ssh2
Nov 11 03:00:49 vtv3 sshd[7334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.228.9.126  user=root
Nov 11 03:00:51 vtv3 sshd[7334]: Failed password for root from 124.228.9.126 port 55060 ssh2
Nov 11 03:05:11 vtv3 sshd[9632]: Invalid user stultz from 124.228.9.126 port 38120
Nov 11 03:05:11 vtv3 sshd[9632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.228.9.126
N
2019-11-20 16:49:55
156.227.67.12 attackspam
Nov 20 09:07:45 vtv3 sshd[31789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.227.67.12 
Nov 20 09:07:48 vtv3 sshd[31789]: Failed password for invalid user rpm from 156.227.67.12 port 33018 ssh2
Nov 20 09:11:34 vtv3 sshd[32660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.227.67.12 
Nov 20 09:23:39 vtv3 sshd[2706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.227.67.12 
Nov 20 09:23:41 vtv3 sshd[2706]: Failed password for invalid user espe from 156.227.67.12 port 37444 ssh2
Nov 20 09:28:03 vtv3 sshd[3655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.227.67.12 
Nov 20 09:40:37 vtv3 sshd[6452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.227.67.12 
Nov 20 09:40:38 vtv3 sshd[6452]: Failed password for invalid user sikha from 156.227.67.12 port 41872 ssh2
Nov 20 09:44:49 vtv3 ss
2019-11-20 16:52:49
42.115.221.40 attackspambots
Nov 20 09:00:25 srv01 sshd[4619]: Invalid user kitty from 42.115.221.40 port 33550
Nov 20 09:00:25 srv01 sshd[4619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.115.221.40
Nov 20 09:00:25 srv01 sshd[4619]: Invalid user kitty from 42.115.221.40 port 33550
Nov 20 09:00:27 srv01 sshd[4619]: Failed password for invalid user kitty from 42.115.221.40 port 33550 ssh2
Nov 20 09:04:52 srv01 sshd[4888]: Invalid user lucky123 from 42.115.221.40 port 40724
...
2019-11-20 17:10:36
185.151.6.252 attackspam
(sshd) Failed SSH login from 185.151.6.252 (AE/United Arab Emirates/-/-/-/[AS202670 Cloudzme Fze]): 1 in the last 3600 secs
2019-11-20 17:05:36
181.231.71.238 attackbots
Bad Postfix AUTH attempts
...
2019-11-20 17:03:44

Recently Reported IPs

131.135.109.195 33.64.197.7 23.246.102.84 54.45.83.159
209.0.186.140 210.83.89.191 197.195.27.242 181.5.4.156
83.137.204.111 199.132.185.178 43.80.146.8 107.167.255.27
100.203.179.181 4.139.230.1 5.253.205.161 59.225.233.70
204.17.122.209 150.229.101.160 18.54.110.121 41.254.67.189