Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vestre Gausdal

Region: Oppland

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.213.52.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16707
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.213.52.38.			IN	A

;; AUTHORITY SECTION:
.			111	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082000 1800 900 604800 86400

;; Query time: 235 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Aug 20 18:55:14 CST 2019
;; MSG SIZE  rcvd: 116
Host info
38.52.213.80.in-addr.arpa domain name pointer ti0111a400-3353.bb.online.no.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
38.52.213.80.in-addr.arpa	name = ti0111a400-3353.bb.online.no.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
41.191.244.2 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-05-16/07-15]17pkt,1pt.(tcp)
2019-07-16 07:48:56
220.83.161.249 attackspam
Jul 16 00:44:09 localhost sshd\[28278\]: Invalid user tim from 220.83.161.249 port 41226
Jul 16 00:44:09 localhost sshd\[28278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.83.161.249
...
2019-07-16 07:52:30
202.126.208.122 attackbots
Jul 16 01:26:09 dev sshd\[24900\]: Invalid user ts3server from 202.126.208.122 port 51037
Jul 16 01:26:09 dev sshd\[24900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.126.208.122
...
2019-07-16 07:39:06
106.241.16.119 attackbotsspam
Jul 16 01:21:44 vps691689 sshd[15333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.16.119
Jul 16 01:21:46 vps691689 sshd[15333]: Failed password for invalid user b from 106.241.16.119 port 50572 ssh2
...
2019-07-16 07:38:11
201.211.209.121 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 16:00:59,204 INFO [shellcode_manager] (201.211.209.121) no match, writing hexdump (5a20277e1eb89b8f5b7fe3dbed4ed001 :1905893) - SMB (Unknown)
2019-07-16 08:03:10
195.246.57.116 attackbots
445/tcp 445/tcp 445/tcp...
[2019-05-16/07-15]6pkt,1pt.(tcp)
2019-07-16 07:51:54
131.196.239.195 attackspam
Automatic report - Port Scan Attack
2019-07-16 07:42:27
62.234.108.245 attack
Jul 16 05:15:11 vibhu-HP-Z238-Microtower-Workstation sshd\[18599\]: Invalid user misson from 62.234.108.245
Jul 16 05:15:11 vibhu-HP-Z238-Microtower-Workstation sshd\[18599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.108.245
Jul 16 05:15:13 vibhu-HP-Z238-Microtower-Workstation sshd\[18599\]: Failed password for invalid user misson from 62.234.108.245 port 58484 ssh2
Jul 16 05:18:53 vibhu-HP-Z238-Microtower-Workstation sshd\[19339\]: Invalid user jin from 62.234.108.245
Jul 16 05:18:53 vibhu-HP-Z238-Microtower-Workstation sshd\[19339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.108.245
...
2019-07-16 07:56:30
197.45.132.191 attackspam
445/tcp 445/tcp
[2019-06-17/07-15]2pkt
2019-07-16 07:56:47
111.76.133.49 attack
2019-07-15T17:49:24.053602beta postfix/smtpd[26416]: warning: unknown[111.76.133.49]: SASL LOGIN authentication failed: authentication failure
2019-07-15T17:49:27.305843beta postfix/smtpd[26416]: warning: unknown[111.76.133.49]: SASL LOGIN authentication failed: authentication failure
2019-07-15T17:49:30.938831beta postfix/smtpd[26416]: warning: unknown[111.76.133.49]: SASL LOGIN authentication failed: authentication failure
...
2019-07-16 07:39:33
218.92.1.156 attackspam
Jul 16 01:06:45 s64-1 sshd[4034]: Failed password for root from 218.92.1.156 port 64853 ssh2
Jul 16 01:10:59 s64-1 sshd[4176]: Failed password for root from 218.92.1.156 port 48382 ssh2
...
2019-07-16 07:19:40
221.122.73.130 attackbots
Jul 15 18:18:05 aat-srv002 sshd[25568]: Failed password for invalid user web from 221.122.73.130 port 33519 ssh2
Jul 15 18:35:03 aat-srv002 sshd[25941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.73.130
Jul 15 18:35:05 aat-srv002 sshd[25941]: Failed password for invalid user scan from 221.122.73.130 port 34322 ssh2
Jul 15 18:37:26 aat-srv002 sshd[25979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.73.130
...
2019-07-16 07:44:03
14.241.120.92 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 22:51:03,114 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.241.120.92)
2019-07-16 07:33:43
99.185.76.161 attack
Jul 16 00:55:33 MK-Soft-Root1 sshd\[11357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.185.76.161  user=www-data
Jul 16 00:55:35 MK-Soft-Root1 sshd\[11357\]: Failed password for www-data from 99.185.76.161 port 52564 ssh2
Jul 16 01:00:16 MK-Soft-Root1 sshd\[12046\]: Invalid user kristine from 99.185.76.161 port 50960
Jul 16 01:00:16 MK-Soft-Root1 sshd\[12046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.185.76.161
...
2019-07-16 07:24:55
106.13.1.203 attack
2019-07-16T00:04:47.312193centos sshd\[24315\]: Invalid user telnet from 106.13.1.203 port 51956
2019-07-16T00:04:47.317218centos sshd\[24315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.1.203
2019-07-16T00:04:49.890094centos sshd\[24315\]: Failed password for invalid user telnet from 106.13.1.203 port 51956 ssh2
2019-07-16 07:56:15

Recently Reported IPs

3.119.96.74 180.86.222.210 207.23.201.47 60.52.95.214
115.175.2.69 125.25.13.249 206.117.54.24 134.130.148.212
107.164.225.9 199.19.225.67 72.39.133.122 51.15.212.48
167.99.32.72 211.13.81.226 88.227.110.7 31.86.117.252
245.28.25.70 90.209.158.32 140.41.49.38 200.82.138.40