Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stockholm

Region: Stockholms

Country: Sweden

Internet Service Provider: Tele2

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '80.217.96.0 - 80.217.111.255'

% Abuse contact for '80.217.96.0 - 80.217.111.255' is 'abuse@tele2.com'

inetnum:        80.217.96.0 - 80.217.111.255
netname:        SE-TELE2-CABLE-CUSTOMER
country:        SE
admin-c:        SWIP-RIPE
tech-c:         SWIP-RIPE
status:         ASSIGNED PA
mnt-by:         COMHEM-MNT
created:        2018-09-04T08:53:34Z
last-modified:  2021-04-27T05:31:45Z
source:         RIPE

role:           Swipnet Staff
address:        Tele2 AB/Swedish IP Network
address:        IP Registry
address:        Torshamnsgatan 17 164 40 Kista SWEDEN
fax-no:         +46 8 5626 42 10
abuse-mailbox:  abuse@tele2.com
remarks:        The database object describes the staff of SWIPNET LIR.
admin-c:        ROSI3-RIPE
admin-c:        TH6544-RIPE
tech-c:         ROSI3-RIPE
tech-c:         TH6544-RIPE
nic-hdl:        SWIP-RIPE
mnt-by:         SWIPNET-LIR-MNT
created:        2002-03-21T14:25:04Z
last-modified:  2022-11-23T10:36:53Z
source:         RIPE # Filtered

% Information related to '80.216.0.0/15AS1257'

route:          80.216.0.0/15
origin:         AS1257
mnt-by:         AS1257-MNT
created:        2021-07-13T10:14:08Z
last-modified:  2021-07-13T10:14:08Z
source:         RIPE

% Information related to '80.216.0.0/15AS39651'

route:          80.216.0.0/15
descr:          Com Hem AB
origin:         AS39651
mnt-by:         COMHEM-MNT
created:        2006-10-25T11:55:24Z
last-modified:  2008-05-05T19:51:40Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.217.106.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27108
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.217.106.60.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033102 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 05:30:07 CST 2026
;; MSG SIZE  rcvd: 106
Host info
60.106.217.80.in-addr.arpa domain name pointer c80-217-106-60.bredband.tele2.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
60.106.217.80.in-addr.arpa	name = c80-217-106-60.bredband.tele2.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.89 attackspam
Sep  5 23:15:06 server sshd\[20424\]: User root from 112.85.42.89 not allowed because listed in DenyUsers
Sep  5 23:15:07 server sshd\[20424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89  user=root
Sep  5 23:15:09 server sshd\[20424\]: Failed password for invalid user root from 112.85.42.89 port 14646 ssh2
Sep  5 23:15:11 server sshd\[20424\]: Failed password for invalid user root from 112.85.42.89 port 14646 ssh2
Sep  5 23:15:13 server sshd\[20424\]: Failed password for invalid user root from 112.85.42.89 port 14646 ssh2
2019-09-06 04:29:36
51.83.78.109 attack
Sep  5 21:54:17 localhost sshd\[960\]: Invalid user dev from 51.83.78.109
Sep  5 21:54:17 localhost sshd\[960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.109
Sep  5 21:54:20 localhost sshd\[960\]: Failed password for invalid user dev from 51.83.78.109 port 51228 ssh2
Sep  5 21:58:20 localhost sshd\[1160\]: Invalid user jenkins from 51.83.78.109
Sep  5 21:58:20 localhost sshd\[1160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.109
...
2019-09-06 04:05:17
222.186.15.101 attackspam
Sep  5 15:05:31 aat-srv002 sshd[24501]: Failed password for root from 222.186.15.101 port 13696 ssh2
Sep  5 15:05:33 aat-srv002 sshd[24501]: Failed password for root from 222.186.15.101 port 13696 ssh2
Sep  5 15:05:36 aat-srv002 sshd[24501]: Failed password for root from 222.186.15.101 port 13696 ssh2
Sep  5 15:19:10 aat-srv002 sshd[24911]: Failed password for root from 222.186.15.101 port 51068 ssh2
...
2019-09-06 04:26:26
196.189.91.134 attackspambots
firewall-block, port(s): 445/tcp
2019-09-06 04:32:03
185.176.27.102 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-06 04:22:51
217.105.19.107 attackspambots
firewall-block, port(s): 23/tcp
2019-09-06 04:28:20
118.122.191.187 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-09-06 03:50:48
185.36.81.246 attack
Rude login attack (28 tries in 1d)
2019-09-06 04:01:33
5.196.69.70 attackspambots
SSH Brute Force
2019-09-06 04:29:52
141.98.9.205 attack
Sep  5 21:52:30 relay postfix/smtpd\[26554\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 21:53:13 relay postfix/smtpd\[29172\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 21:53:22 relay postfix/smtpd\[28522\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 21:54:06 relay postfix/smtpd\[2216\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 21:54:13 relay postfix/smtpd\[26554\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-06 04:05:00
83.99.46.35 attackspam
Automatic report - Port Scan Attack
2019-09-06 03:58:01
5.39.87.46 attackspambots
Sep  5 19:57:18 hcbbdb sshd\[32528\]: Invalid user passw0rd from 5.39.87.46
Sep  5 19:57:18 hcbbdb sshd\[32528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3050514.ip-5-39-87.eu
Sep  5 19:57:21 hcbbdb sshd\[32528\]: Failed password for invalid user passw0rd from 5.39.87.46 port 53808 ssh2
Sep  5 20:01:40 hcbbdb sshd\[580\]: Invalid user customer from 5.39.87.46
Sep  5 20:01:40 hcbbdb sshd\[580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3050514.ip-5-39-87.eu
2019-09-06 04:11:20
165.22.58.108 attackbots
Sep  5 09:43:13 hpm sshd\[1075\]: Invalid user 123 from 165.22.58.108
Sep  5 09:43:13 hpm sshd\[1075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.58.108
Sep  5 09:43:15 hpm sshd\[1075\]: Failed password for invalid user 123 from 165.22.58.108 port 42282 ssh2
Sep  5 09:47:57 hpm sshd\[1492\]: Invalid user vbox@123 from 165.22.58.108
Sep  5 09:47:57 hpm sshd\[1492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.58.108
2019-09-06 04:01:50
113.233.58.251 attackspam
Sep  5 22:10:48 www4 sshd\[51306\]: Invalid user pi from 113.233.58.251
Sep  5 22:10:48 www4 sshd\[51307\]: Invalid user pi from 113.233.58.251
Sep  5 22:10:48 www4 sshd\[51306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.233.58.251
...
2019-09-06 04:03:50
168.128.13.253 attack
Sep  5 22:09:53 dedicated sshd[17338]: Invalid user ftpsecure from 168.128.13.253 port 37402
2019-09-06 04:10:31

Recently Reported IPs

120.55.95.177 54.196.157.164 54.174.222.165 223.123.73.71
1.83.125.59 114.97.191.45 27.46.125.117 10.35.77.177
97.70.244.124 110.77.226.33 2606:4700:10::6814:6692 2606:4700:10::6814:5631
2606:4700:10::ac43:1591 2606:4700:10::6816:3038 2606:4700:10::6814:8843 94.26.88.32
35.203.210.110 162.243.116.182 14.212.114.84 66.132.172.109