Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ulnes

Region: Innlandet

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.213.119.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.213.119.137.			IN	A

;; AUTHORITY SECTION:
.			288	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122701 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 28 10:14:14 CST 2021
;; MSG SIZE  rcvd: 107
Host info
137.119.213.80.in-addr.arpa domain name pointer ti0084a430-1916.bb.online.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.119.213.80.in-addr.arpa	name = ti0084a430-1916.bb.online.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.29.196.172 attackspambots
TCP src-port=36599   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (399)
2019-07-04 17:50:16
128.199.245.158 attackspam
TCP src-port=49842   dst-port=25    dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (397)
2019-07-04 17:55:36
221.163.119.102 attack
23/tcp
[2019-07-04]1pkt
2019-07-04 18:04:57
201.243.56.116 attack
445/tcp
[2019-07-04]1pkt
2019-07-04 18:14:53
182.186.15.209 attackspam
SMB Server BruteForce Attack
2019-07-04 18:34:59
115.227.102.116 attackbots
23/tcp
[2019-07-04]1pkt
2019-07-04 18:31:18
31.146.83.197 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 09:07:22,113 INFO [shellcode_manager] (31.146.83.197) no match, writing hexdump (49499e0d0d1dae1ca0f0e28c69b87a0f :1868286) - MS17010 (EternalBlue)
2019-07-04 18:09:14
187.39.93.38 attack
2019-07-04 06:54:30 H=(bb275d26.virtua.com.br) [187.39.93.38]:49972 I=[10.100.18.21]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=187.39.93.38)
2019-07-04 06:54:31 unexpected disconnection while reading SMTP command from (bb275d26.virtua.com.br) [187.39.93.38]:49972 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-04 08:02:27 H=(bb275d26.virtua.com.br) [187.39.93.38]:16975 I=[10.100.18.21]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=187.39.93.38)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.39.93.38
2019-07-04 18:18:44
184.105.139.102 attackbotsspam
firewall-block, port(s): 123/udp
2019-07-04 18:43:43
153.36.236.242 attackspambots
Jul  4 15:17:27 tanzim-HP-Z238-Microtower-Workstation sshd\[24293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.242  user=root
Jul  4 15:17:28 tanzim-HP-Z238-Microtower-Workstation sshd\[24293\]: Failed password for root from 153.36.236.242 port 14684 ssh2
Jul  4 15:17:50 tanzim-HP-Z238-Microtower-Workstation sshd\[24458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.242  user=root
...
2019-07-04 17:52:55
193.231.242.3 attackbotsspam
Spam Timestamp : 04-Jul-19 05:36 _ BlockList Provider  combined abuse _ (402)
2019-07-04 17:43:35
49.206.214.29 attackspam
445/tcp
[2019-07-04]1pkt
2019-07-04 18:19:19
159.65.148.49 attackspam
TCP src-port=55626   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (392)
2019-07-04 18:06:49
220.247.175.58 attackbots
Triggered by Fail2Ban
2019-07-04 18:21:17
87.121.98.244 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-07-04 18:33:06

Recently Reported IPs

142.192.130.135 146.112.217.191 39.186.232.161 125.138.127.64
251.135.150.209 250.229.61.250 160.221.202.180 231.138.247.119
128.24.1.188 144.225.7.240 6.201.97.29 114.224.45.93
23.183.68.151 144.191.55.89 248.210.174.0 73.122.25.170
100.97.39.220 102.219.201.92 203.134.110.94 62.64.144.150