Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.80.203.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48219
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.80.203.242.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 17:26:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 242.203.80.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.203.80.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
101.228.208.196 attackbotsspam
Automatic report - Port Scan Attack
2020-02-11 18:30:30
182.253.71.108 attackspam
1581396669 - 02/11/2020 05:51:09 Host: 182.253.71.108/182.253.71.108 Port: 445 TCP Blocked
2020-02-11 18:34:57
45.143.223.115 attackspambots
2020-02-10 22:50:25 H=(TK8EekLR9) [45.143.223.115]:3897 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4, 127.0.0.11) (https://www.spamhaus.org/query/ip/45.143.223.115)
2020-02-10 22:50:28 dovecot_login authenticator failed for (IO6hw0Dz9) [45.143.223.115]:3954 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=mrm@lerctr.org)
2020-02-10 22:50:35 dovecot_login authenticator failed for (TPdmVxRj9q) [45.143.223.115]:4060 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=mrm@lerctr.org)
...
2020-02-11 19:01:50
123.206.69.81 attackbots
$f2bV_matches
2020-02-11 18:34:06
207.154.229.50 attackbots
2020-02-10T23:47:11.4020111495-001 sshd[21408]: Invalid user fop from 207.154.229.50 port 44104
2020-02-10T23:47:11.4139441495-001 sshd[21408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50
2020-02-10T23:47:11.4020111495-001 sshd[21408]: Invalid user fop from 207.154.229.50 port 44104
2020-02-10T23:47:13.0618631495-001 sshd[21408]: Failed password for invalid user fop from 207.154.229.50 port 44104 ssh2
2020-02-10T23:49:18.4709211495-001 sshd[21578]: Invalid user qzn from 207.154.229.50 port 39348
2020-02-10T23:49:18.4744641495-001 sshd[21578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50
2020-02-10T23:49:18.4709211495-001 sshd[21578]: Invalid user qzn from 207.154.229.50 port 39348
2020-02-10T23:49:19.8908691495-001 sshd[21578]: Failed password for invalid user qzn from 207.154.229.50 port 39348 ssh2
2020-02-10T23:51:30.5918381495-001 sshd[21667]: Invalid user jix from 20
...
2020-02-11 18:26:39
217.99.187.41 attackspambots
Automatic report - Port Scan Attack
2020-02-11 18:50:24
14.172.67.152 attackspambots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-11 18:28:56
183.83.131.97 attack
Honeypot attack, port: 445, PTR: broadband.actcorp.in.
2020-02-11 18:54:42
71.6.233.125 attack
scan z
2020-02-11 18:22:15
14.235.250.113 attackspambots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-11 18:23:24
66.42.56.59 attackbotsspam
Invalid user mqr from 66.42.56.59 port 40016
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.42.56.59
Failed password for invalid user mqr from 66.42.56.59 port 40016 ssh2
Invalid user rqx from 66.42.56.59 port 36834
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.42.56.59
2020-02-11 18:22:31
27.147.216.132 attackbots
Feb 11 05:50:51 ns381471 sshd[18904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.147.216.132
Feb 11 05:50:53 ns381471 sshd[18904]: Failed password for invalid user admina from 27.147.216.132 port 50099 ssh2
2020-02-11 18:49:04
68.111.35.247 attackspambots
Telnet Server BruteForce Attack
2020-02-11 18:38:38
203.109.69.70 attackbots
Unauthorized connection attempt detected from IP address 203.109.69.70 to port 445
2020-02-11 18:47:14
61.180.4.114 attackbots
'IP reached maximum auth failures for a one day block'
2020-02-11 18:56:34

Recently Reported IPs

39.79.144.93 39.81.40.248 39.81.68.48 39.80.168.174
39.82.11.45 39.83.60.60 39.83.72.137 39.82.11.55
39.85.199.138 39.86.213.80 39.86.221.93 39.86.66.122
39.87.63.194 39.88.117.226 39.88.220.6 39.84.182.101
39.89.145.84 39.86.108.73 39.88.138.67 39.86.237.214