Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Larvik

Region: Vestfold

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: Telenor Norge AS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.213.44.236
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26200
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.213.44.236.			IN	A

;; AUTHORITY SECTION:
.			1876	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081600 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 17 01:33:54 CST 2019
;; MSG SIZE  rcvd: 117
Host info
236.44.213.80.in-addr.arpa domain name pointer ti0062a400-4572.bb.online.no.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
236.44.213.80.in-addr.arpa	name = ti0062a400-4572.bb.online.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.40.202.181 attackspambots
*Port Scan* detected from 104.40.202.181 (NL/Netherlands/-). 4 hits in the last 170 seconds
2019-12-29 21:43:23
177.67.74.232 attackbots
Fail2Ban Ban Triggered
2019-12-29 21:31:24
61.154.197.116 attack
2019-12-29T07:25:48.734746 X postfix/smtpd[7461]: lost connection after AUTH from unknown[61.154.197.116]
2019-12-29T07:25:49.125186 X postfix/smtpd[7676]: lost connection after AUTH from unknown[61.154.197.116]
2019-12-29T07:25:50.222489 X postfix/smtpd[7461]: lost connection after AUTH from unknown[61.154.197.116]
2019-12-29 21:11:35
80.211.76.122 attack
Dec 23 05:02:15 vps34202 sshd[7912]: reveeclipse mapping checking getaddrinfo for host122-76-211-80.serverdedicati.aruba.hostname [80.211.76.122] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec 23 05:02:15 vps34202 sshd[7912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.76.122  user=r.r
Dec 23 05:02:17 vps34202 sshd[7912]: Failed password for r.r from 80.211.76.122 port 50398 ssh2
Dec 23 05:02:17 vps34202 sshd[7912]: Received disconnect from 80.211.76.122: 11: Bye Bye [preauth]
Dec 23 05:02:17 vps34202 sshd[7914]: reveeclipse mapping checking getaddrinfo for host122-76-211-80.serverdedicati.aruba.hostname [80.211.76.122] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec 23 05:02:17 vps34202 sshd[7914]: Invalid user admin from 80.211.76.122
Dec 23 05:02:17 vps34202 sshd[7914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.76.122 
Dec 23 05:02:20 vps34202 sshd[7914]: Failed password for inva........
-------------------------------
2019-12-29 21:27:34
45.168.0.7 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-12-29 21:13:14
125.165.192.138 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-12-29 21:28:19
120.132.124.179 attackspambots
Unauthorized connection attempt detected from IP address 120.132.124.179 to port 445
2019-12-29 21:04:01
118.32.223.67 attackbots
Dec 29 09:08:19 srv206 sshd[2939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.223.67  user=root
Dec 29 09:08:22 srv206 sshd[2939]: Failed password for root from 118.32.223.67 port 36384 ssh2
...
2019-12-29 21:44:40
80.244.179.6 attackbots
Invalid user arrow from 80.244.179.6 port 47936
2019-12-29 21:26:23
222.186.15.246 attackbotsspam
--- report ---
Dec 29 08:13:21 -0300 sshd: Connection from 222.186.15.246 port 36991
Dec 29 08:13:47 -0300 sshd: Received disconnect from 222.186.15.246: 11:  [preauth]
2019-12-29 21:33:57
121.128.208.87 attackspambots
Scanning
2019-12-29 21:37:07
206.217.139.200 attack
(From vauvert@free.fr) Freе dating site fоr seх: http://xsle.net/adultdating476228
2019-12-29 21:39:19
41.223.4.155 attackbotsspam
failed root login
2019-12-29 21:04:35
181.226.177.3 attack
Unauthorized connection attempt detected from IP address 181.226.177.3 to port 445
2019-12-29 21:23:50
144.217.188.81 attackspam
$f2bV_matches
2019-12-29 21:04:53

Recently Reported IPs

82.90.34.47 184.185.236.75 124.32.176.182 216.138.46.66
221.84.240.50 61.50.9.225 198.171.153.55 183.225.1.51
115.47.251.65 201.189.182.203 191.31.6.226 150.41.255.80
2601:2c3:8980:39da:9815:b5b5:3ce2:2436 85.121.147.201 122.14.243.159 211.175.171.248
101.228.86.71 21.192.49.41 95.165.218.58 75.49.143.81