Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sandefjord

Region: unknown

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.19.86.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15145
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;77.19.86.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 11:51:50 CST 2025
;; MSG SIZE  rcvd: 104
Host info
80.86.19.77.in-addr.arpa domain name pointer 77.19.86.80.tmi.telenormobil.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.86.19.77.in-addr.arpa	name = 77.19.86.80.tmi.telenormobil.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.177.172.142 attackspambots
[MK-VM5] SSH login failed
2020-09-04 15:33:41
117.50.49.57 attack
Invalid user nina from 117.50.49.57 port 42840
2020-09-04 15:39:16
165.231.84.110 attackbots
Unauthorized connection attempt detected, IP banned.
2020-09-04 15:26:05
67.6.254.157 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-09-04 15:41:44
166.62.80.165 attackspambots
xmlrpc attack
2020-09-04 15:36:38
193.169.254.91 attackspam
3x Failed Password
2020-09-04 16:01:06
183.2.102.19 attackspambots
Lines containing failures of 183.2.102.19
Sep  2 04:40:06 newdogma sshd[28433]: Invalid user csvn from 183.2.102.19 port 40690
Sep  2 04:40:06 newdogma sshd[28433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.2.102.19 
Sep  2 04:40:08 newdogma sshd[28433]: Failed password for invalid user csvn from 183.2.102.19 port 40690 ssh2
Sep  2 04:40:10 newdogma sshd[28433]: Received disconnect from 183.2.102.19 port 40690:11: Bye Bye [preauth]
Sep  2 04:40:10 newdogma sshd[28433]: Disconnected from invalid user csvn 183.2.102.19 port 40690 [preauth]
Sep  2 04:45:26 newdogma sshd[29511]: Invalid user michael from 183.2.102.19 port 37776
Sep  2 04:45:26 newdogma sshd[29511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.2.102.19 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=183.2.102.19
2020-09-04 15:32:27
74.120.14.49 attack
Unauthorized connection attempt from IP address 74.120.14.49 on Port 587(SMTP-MSA)
2020-09-04 15:54:43
157.0.134.164 attackbots
Ssh brute force
2020-09-04 15:42:14
61.177.172.128 attack
Sep  4 09:17:43 pve1 sshd[1725]: Failed password for root from 61.177.172.128 port 30008 ssh2
Sep  4 09:17:47 pve1 sshd[1725]: Failed password for root from 61.177.172.128 port 30008 ssh2
...
2020-09-04 15:28:27
170.80.173.18 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-04 15:47:53
175.17.151.95 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-09-04 15:47:40
118.69.71.106 attack
fail2ban
2020-09-04 15:53:52
193.228.91.123 attackbotsspam
SSH brutforce
2020-09-04 15:55:41
94.230.125.41 attackspam
20/9/3@12:46:58: FAIL: Alarm-Network address from=94.230.125.41
...
2020-09-04 15:49:19

Recently Reported IPs

127.235.226.207 233.117.200.82 84.17.44.121 197.28.140.23
160.16.39.236 31.91.83.67 140.199.134.218 173.69.145.232
83.51.148.67 233.1.147.218 252.57.152.237 172.224.237.54
165.61.222.50 116.206.9.43 62.182.154.188 92.153.209.122
29.102.240.32 131.73.53.61 255.113.237.186 4.130.136.3