Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.112.119.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10449
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.112.119.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:05:38 CST 2025
;; MSG SIZE  rcvd: 107
Host info
214.119.112.80.in-addr.arpa domain name pointer 80-112-119-214.cable.dynamic.v4.ziggo.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.119.112.80.in-addr.arpa	name = 80-112-119-214.cable.dynamic.v4.ziggo.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
62.234.91.113 attackspambots
Automatic report - Banned IP Access
2019-08-28 17:29:28
206.189.137.113 attackspambots
$f2bV_matches
2019-08-28 17:27:20
139.59.140.55 attack
Automatic report - Banned IP Access
2019-08-28 18:06:12
52.230.68.68 attackspambots
Aug 27 22:45:00 web9 sshd\[14509\]: Invalid user pp from 52.230.68.68
Aug 27 22:45:00 web9 sshd\[14509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.230.68.68
Aug 27 22:45:02 web9 sshd\[14509\]: Failed password for invalid user pp from 52.230.68.68 port 53606 ssh2
Aug 27 22:50:12 web9 sshd\[15486\]: Invalid user nagios from 52.230.68.68
Aug 27 22:50:12 web9 sshd\[15486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.230.68.68
2019-08-28 17:09:52
115.29.3.34 attackbots
Aug 28 08:41:14 server sshd\[32667\]: Invalid user wildfly from 115.29.3.34 port 32866
Aug 28 08:41:14 server sshd\[32667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.29.3.34
Aug 28 08:41:16 server sshd\[32667\]: Failed password for invalid user wildfly from 115.29.3.34 port 32866 ssh2
Aug 28 08:44:49 server sshd\[6975\]: Invalid user wwwdata from 115.29.3.34 port 46758
Aug 28 08:44:49 server sshd\[6975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.29.3.34
2019-08-28 17:26:13
142.93.198.86 attackbots
Triggered by Fail2Ban at Ares web server
2019-08-28 17:52:02
112.85.42.173 attackbotsspam
SSH Bruteforce
2019-08-28 17:43:27
185.176.27.162 attackspambots
Multiport scan : 9 ports scanned 1389 3939 4010 5050 8001 33830 34000 43390 50010
2019-08-28 17:09:17
144.217.241.40 attack
Aug 28 10:29:41 dev0-dcde-rnet sshd[10919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.241.40
Aug 28 10:29:43 dev0-dcde-rnet sshd[10919]: Failed password for invalid user david from 144.217.241.40 port 44230 ssh2
Aug 28 10:33:44 dev0-dcde-rnet sshd[10943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.241.40
2019-08-28 17:08:48
5.62.41.173 attackbots
\[2019-08-28 10:30:45\] NOTICE\[2943\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '5.62.41.173:5604' \(callid: 1026344613-653315261-1997518480\) - Failed to authenticate
\[2019-08-28 10:30:45\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-08-28T10:30:45.443+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="1026344613-653315261-1997518480",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/5.62.41.173/5604",Challenge="1566981045/3588327826628b1b157ff36dfc667cdb",Response="7779297b91f976dc214478a99fd1f364",ExpectedResponse=""
\[2019-08-28 10:30:45\] NOTICE\[3817\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '5.62.41.173:5604' \(callid: 1026344613-653315261-1997518480\) - Failed to authenticate
\[2019-08-28 10:30:45\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",
2019-08-28 17:07:50
200.33.156.131 attackbots
2019-08-27 23:23:01 H=(200-33-156-131.fernandopolisnet.com.br) [200.33.156.131]:41552 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-08-27 23:23:02 H=(200-33-156-131.fernandopolisnet.com.br) [200.33.156.131]:41552 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-08-27 23:23:02 H=(200-33-156-131.fernandopolisnet.com.br) [200.33.156.131]:41552 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-08-28 18:11:56
112.45.114.76 attackbotsspam
Aug 28 00:23:02 web1 postfix/smtpd[16709]: warning: unknown[112.45.114.76]: SASL LOGIN authentication failed: authentication failure
...
2019-08-28 18:09:53
193.112.123.100 attackspam
Aug 27 19:50:02 eddieflores sshd\[32700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.123.100  user=root
Aug 27 19:50:03 eddieflores sshd\[32700\]: Failed password for root from 193.112.123.100 port 51112 ssh2
Aug 27 19:55:31 eddieflores sshd\[727\]: Invalid user kjh from 193.112.123.100
Aug 27 19:55:31 eddieflores sshd\[727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.123.100
Aug 27 19:55:32 eddieflores sshd\[727\]: Failed password for invalid user kjh from 193.112.123.100 port 39946 ssh2
2019-08-28 17:14:48
82.208.177.139 attack
Invalid user uta from 82.208.177.139 port 48672
2019-08-28 17:43:51
153.35.123.27 attackspam
Aug 28 11:09:50 vps691689 sshd[25139]: Failed password for root from 153.35.123.27 port 40970 ssh2
Aug 28 11:15:03 vps691689 sshd[25251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.35.123.27
...
2019-08-28 17:21:48

Recently Reported IPs

231.139.105.87 8.142.243.63 59.95.27.137 59.40.241.220
143.61.42.199 128.246.145.149 164.125.190.74 86.245.149.63
95.150.184.161 29.215.88.116 150.99.87.99 124.79.115.66
55.161.131.152 8.220.136.102 37.129.221.9 172.64.13.248
249.23.194.251 69.190.78.48 210.133.213.50 246.149.228.57