Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kruibeke

Region: Flemish Region

Country: Belgium

Internet Service Provider: Proximus

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
80.200.240.59 attack
Brute forcing email accounts
2020-05-03 01:48:42
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '80.200.240.0 - 80.200.240.255'

% Abuse contact for '80.200.240.0 - 80.200.240.255' is 'abuse@proximus.com'

inetnum:        80.200.240.0 - 80.200.240.255
netname:        BE-SKYNET-20011108
descr:          ADSL-OFFICE
descr:          Belgacom ISP SA/NV
country:        BE
admin-c:        SN2068-RIPE
tech-c:         SN2068-RIPE
status:         ASSIGNED PA
mnt-by:         SKYNETBE-MNT
mnt-by:         SKYNETBE-ROBOT-MNT
created:        2005-03-18T14:37:13Z
last-modified:  2023-07-27T09:43:53Z
source:         RIPE

role:           Proximus NOC administrators
address:        Proximus SA de droit public
address:        TEC/NEO/IPR/TDN/DTO/DSL Internet Networks
address:        Boulevard du Roi Albert II, 27
address:        B-1030 Bruxelles
address:        Belgium
phone:          +32 2 202-4111
fax-no:         +32 2 203-6593
abuse-mailbox:  abuse@proximus.com
admin-c:        BIEC1-RIPE
tech-c:         BIEC1-RIPE
nic-hdl:        SN2068-RIPE
remarks:        ******************************************
remarks:        Abuse notifications to: abuse@proximus.com
remarks:        Abuse mails sent to other addresses will be ignored !
remarks:        ******************************************
remarks:        Network problems to: noc@skynet.be
remarks:        Peering requests to: peering@skynet.be
mnt-by:         SKYNETBE-MNT
created:        1970-01-01T00:00:00Z
last-modified:  2020-03-04T06:19:15Z
source:         RIPE # Filtered

% Information related to '80.200.0.0/16AS5432'

route:          80.200.0.0/16
descr:          FIA-002
origin:         AS5432
mnt-by:         SKYNETBE-MNT
created:        2022-09-28T07:51:59Z
last-modified:  2022-09-28T07:51:59Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.200.240.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56496
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.200.240.132.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041601 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 16 21:08:06 CST 2026
;; MSG SIZE  rcvd: 107
Host info
132.240.200.80.in-addr.arpa domain name pointer www.bigtower.be.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.240.200.80.in-addr.arpa	name = www.bigtower.be.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
137.74.173.182 attackspambots
Mar 21 19:49:54 markkoudstaal sshd[18195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.173.182
Mar 21 19:49:56 markkoudstaal sshd[18195]: Failed password for invalid user pj from 137.74.173.182 port 60722 ssh2
Mar 21 19:55:08 markkoudstaal sshd[18814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.173.182
2020-03-22 03:16:39
103.45.110.143 attack
Invalid user wynonna from 103.45.110.143 port 36192
2020-03-22 03:37:06
176.31.252.148 attackbots
SSH Brute-Force attacks
2020-03-22 03:09:45
159.89.129.36 attackspam
Mar 21 16:53:42 sso sshd[31484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.129.36
Mar 21 16:53:44 sso sshd[31484]: Failed password for invalid user cole from 159.89.129.36 port 39198 ssh2
...
2020-03-22 03:12:38
109.167.200.10 attackspam
Invalid user andoria from 109.167.200.10 port 41548
2020-03-22 03:30:12
149.202.164.82 attackspam
2020-03-21T19:08:34.479911shield sshd\[15702\]: Invalid user oikawa from 149.202.164.82 port 40872
2020-03-21T19:08:34.485444shield sshd\[15702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82
2020-03-21T19:08:36.370521shield sshd\[15702\]: Failed password for invalid user oikawa from 149.202.164.82 port 40872 ssh2
2020-03-21T19:12:22.646813shield sshd\[16660\]: Invalid user barretta from 149.202.164.82 port 33000
2020-03-21T19:12:22.657027shield sshd\[16660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82
2020-03-22 03:13:58
123.49.47.26 attackspam
5x Failed Password
2020-03-22 03:21:52
103.245.181.2 attackspambots
$f2bV_matches
2020-03-22 03:36:05
111.229.85.222 attackspam
Unauthorized SSH login attempts
2020-03-22 03:27:27
103.10.30.204 attackbots
DATE:2020-03-21 20:34:25, IP:103.10.30.204, PORT:ssh SSH brute force auth (docker-dc)
2020-03-22 03:37:41
111.231.71.157 attackspambots
Mar 21 16:55:15 XXX sshd[56619]: Invalid user joanie from 111.231.71.157 port 33002
2020-03-22 03:27:02
111.67.207.174 attackspam
Invalid user p from 111.67.207.174 port 34908
2020-03-22 03:28:01
106.13.88.44 attackbotsspam
Mar 21 16:13:43 firewall sshd[20470]: Invalid user shuchang from 106.13.88.44
Mar 21 16:13:45 firewall sshd[20470]: Failed password for invalid user shuchang from 106.13.88.44 port 45776 ssh2
Mar 21 16:16:24 firewall sshd[20591]: Invalid user keli from 106.13.88.44
...
2020-03-22 03:32:24
109.227.63.3 attack
$f2bV_matches
2020-03-22 03:29:38
120.85.247.167 attackbots
SSH/22 MH Probe, BF, Hack -
2020-03-22 03:23:56

Recently Reported IPs

171.37.47.7 2606:4700:10::ac43:2088 110.78.154.117 2606:4700:10::6816:2049
2606:4700:10::6816:4176 2606:4700:10::6816:2232 2606:4700:10::6814:5808 20.83.27.184
13.89.125.20 47.236.85.155 2606:4700:10::6816:4910 110.78.138.209
2606:4700:10::ac43:2835 2606:4700:10::6814:4918 174.85.176.131 88.101.166.206
34.206.249.188 146.16.227.26 43.111.111.93 22.30.13.71