Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oslo

Region: Oslo

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.212.99.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61709
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.212.99.201.			IN	A

;; AUTHORITY SECTION:
.			266	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011400 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 14 22:18:52 CST 2023
;; MSG SIZE  rcvd: 106
Host info
201.99.212.80.in-addr.arpa domain name pointer ti0125a400-5793.bb.online.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
201.99.212.80.in-addr.arpa	name = ti0125a400-5793.bb.online.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.103.254.24 attack
Oct 22 06:46:28 www5 sshd\[3015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.254.24  user=root
Oct 22 06:46:31 www5 sshd\[3015\]: Failed password for root from 177.103.254.24 port 52346 ssh2
Oct 22 06:51:00 www5 sshd\[3836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.254.24  user=root
...
2019-10-22 17:34:36
106.14.105.201 attackspam
port scan and connect, tcp 5432 (postgresql)
2019-10-22 17:27:12
112.186.77.78 attack
2019-10-22T04:40:22.990644abusebot-5.cloudsearch.cf sshd\[14518\]: Invalid user kathi from 112.186.77.78 port 51166
2019-10-22 16:57:20
125.64.94.212 attackspam
UTC: 2019-10-21 pkts: 3(2, 1)
ports(tcp): 102, 888
port (udp): 69
2019-10-22 17:01:51
176.31.57.150 attackspambots
22.10.2019 05:51:09 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-10-22 17:34:53
222.72.135.177 attackspam
$f2bV_matches
2019-10-22 16:59:48
114.39.54.137 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 17:04:36
103.54.219.107 attack
2019-10-22T09:20:48.125858abusebot.cloudsearch.cf sshd\[27028\]: Invalid user oracle from 103.54.219.107 port 41096
2019-10-22 17:26:05
146.88.240.2 attack
10/22/2019-00:48:03.202677 146.88.240.2 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2019-10-22 17:15:57
37.139.13.105 attackspam
Oct 21 20:02:51 server sshd\[17823\]: Failed password for invalid user jboss from 37.139.13.105 port 52550 ssh2
Oct 22 12:03:47 server sshd\[5007\]: Invalid user ubuntu from 37.139.13.105
Oct 22 12:03:47 server sshd\[5007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105 
Oct 22 12:03:49 server sshd\[5007\]: Failed password for invalid user ubuntu from 37.139.13.105 port 41420 ssh2
Oct 22 12:08:08 server sshd\[6101\]: Invalid user support from 37.139.13.105
Oct 22 12:08:08 server sshd\[6101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105 
...
2019-10-22 17:30:01
58.217.157.209 attackspambots
UTC: 2019-10-21 pkts: 2 port: 23/tcp
2019-10-22 17:20:47
193.151.13.22 attackbotsspam
UTC: 2019-10-21 port: 80/tcp
2019-10-22 17:33:37
124.166.111.138 attackspam
UTC: 2019-10-21 port: 123/udp
2019-10-22 17:19:44
151.235.205.161 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 17:30:26
95.165.166.151 attackspambots
DATE:2019-10-22 05:39:39, IP:95.165.166.151, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis)
2019-10-22 17:17:09

Recently Reported IPs

80.196.101.124 80.184.117.133 80.182.217.185 8.78.141.235
8.33.53.206 213.185.233.87 125.180.104.88 8.135.188.133
8.14.130.57 79.43.140.61 145.125.201.60 79.250.55.201
79.181.89.231 146.70.123.60 78.38.222.209 78.26.127.235
222.187.225.11 78.155.68.188 78.133.84.114 78.108.217.176