Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Haslev

Region: Region Sjæland

Country: Denmark

Internet Service Provider: TDC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.166.187.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.166.187.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030701 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 02:08:24 CST 2025
;; MSG SIZE  rcvd: 106
Host info
40.187.166.80.in-addr.arpa domain name pointer 80-166-187-40-static.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.187.166.80.in-addr.arpa	name = 80-166-187-40-static.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
132.232.1.62 attackspam
$f2bV_matches
2019-10-19 06:49:23
23.129.64.170 attack
2019-10-18T21:56:50.583849abusebot.cloudsearch.cf sshd\[29872\]: Invalid user sysomc from 23.129.64.170 port 22962
2019-10-19 07:13:25
178.128.17.32 attack
178.128.17.32 - - [18/Oct/2019:21:49:11 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.17.32 - - [18/Oct/2019:21:49:18 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.17.32 - - [18/Oct/2019:21:49:18 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.17.32 - - [18/Oct/2019:21:49:19 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.17.32 - - [18/Oct/2019:21:49:25 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.17.32 - - [18/Oct/2019:21:49:31 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-10-19 06:56:58
104.238.120.29 attackbotsspam
abcdata-sys.de:80 104.238.120.29 - - \[18/Oct/2019:21:47:49 +0200\] "POST /xmlrpc.php HTTP/1.1" 301 441 "-" "Poster"
www.goldgier.de 104.238.120.29 \[18/Oct/2019:21:47:50 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4469 "-" "Poster"
2019-10-19 06:45:01
116.202.15.206 attack
Forged login request.
2019-10-19 07:16:19
193.32.163.182 attackbots
SSH bruteforce (Triggered fail2ban)
2019-10-19 07:09:46
128.199.55.13 attackspambots
Oct 18 17:40:27 TORMINT sshd\[14754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.55.13  user=root
Oct 18 17:40:29 TORMINT sshd\[14754\]: Failed password for root from 128.199.55.13 port 48132 ssh2
Oct 18 17:44:52 TORMINT sshd\[14871\]: Invalid user bb from 128.199.55.13
Oct 18 17:44:52 TORMINT sshd\[14871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.55.13
...
2019-10-19 07:15:33
187.145.145.134 attack
scan z
2019-10-19 06:45:50
59.175.187.2 attackbots
Automatic report - Port Scan Attack
2019-10-19 07:10:03
150.95.135.190 attackspam
Oct 18 22:20:46 server sshd\[4900\]: Invalid user master4 from 150.95.135.190
Oct 18 22:20:46 server sshd\[4900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-135-190.a080.g.tyo1.static.cnode.io 
Oct 18 22:20:47 server sshd\[4900\]: Failed password for invalid user master4 from 150.95.135.190 port 42120 ssh2
Oct 18 22:48:54 server sshd\[12049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-135-190.a080.g.tyo1.static.cnode.io  user=root
Oct 18 22:48:55 server sshd\[12049\]: Failed password for root from 150.95.135.190 port 42550 ssh2
...
2019-10-19 07:17:03
66.240.205.34 attack
10/18/2019-19:04:55.342514 66.240.205.34 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 68
2019-10-19 07:18:09
190.171.161.234 attackspam
Oct 18 21:48:37 v22018076622670303 sshd\[18261\]: Invalid user admin from 190.171.161.234 port 40743
Oct 18 21:48:37 v22018076622670303 sshd\[18261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.171.161.234
Oct 18 21:48:40 v22018076622670303 sshd\[18261\]: Failed password for invalid user admin from 190.171.161.234 port 40743 ssh2
...
2019-10-19 06:58:07
141.98.81.111 attackbotsspam
Invalid user admin from 141.98.81.111 port 55875
2019-10-19 07:08:40
177.85.116.242 attackspambots
2019-10-18T19:48:43.083712abusebot-3.cloudsearch.cf sshd\[9843\]: Invalid user megastar from 177.85.116.242 port 36631
2019-10-19 07:22:20
180.250.140.74 attack
Oct 18 22:54:14 localhost sshd\[7859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.140.74  user=root
Oct 18 22:54:16 localhost sshd\[7859\]: Failed password for root from 180.250.140.74 port 59726 ssh2
Oct 18 23:02:29 localhost sshd\[8140\]: Invalid user oracle from 180.250.140.74 port 60008
Oct 18 23:02:29 localhost sshd\[8140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.140.74
Oct 18 23:02:30 localhost sshd\[8140\]: Failed password for invalid user oracle from 180.250.140.74 port 60008 ssh2
...
2019-10-19 07:04:44

Recently Reported IPs

35.254.78.125 22.237.27.153 177.158.219.229 246.59.41.126
25.208.17.211 4.218.64.210 7.111.211.151 254.94.61.223
124.82.84.200 3.240.157.176 145.11.123.246 44.49.24.171
205.148.127.23 233.76.40.241 68.107.51.64 177.73.112.184
57.143.5.38 226.173.75.204 234.235.88.216 202.3.202.20