Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.219.64.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51232
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.219.64.240.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120402 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 05 06:10:48 CST 2019
;; MSG SIZE  rcvd: 117
Host info
240.64.219.80.in-addr.arpa domain name pointer 80-219-64-240.dclient.hispeed.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
240.64.219.80.in-addr.arpa	name = 80-219-64-240.dclient.hispeed.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.226.71.163 attackbots
Invalid user ubuntu from 129.226.71.163 port 34214
2020-05-13 08:29:03
134.17.94.158 attackspam
May 13 00:14:55 marvibiene sshd[65439]: Invalid user rondinelly from 134.17.94.158 port 5895
May 13 00:14:55 marvibiene sshd[65439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.158
May 13 00:14:55 marvibiene sshd[65439]: Invalid user rondinelly from 134.17.94.158 port 5895
May 13 00:14:57 marvibiene sshd[65439]: Failed password for invalid user rondinelly from 134.17.94.158 port 5895 ssh2
...
2020-05-13 08:26:49
59.127.139.71 attackspambots
Port probing on unauthorized port 9000
2020-05-13 08:44:26
206.189.44.207 attackspambots
Scanned 3 times in the last 24 hours on port 22
2020-05-13 09:05:48
151.80.144.255 attackbots
May 12 08:37:52: Invalid user ubuntu from 151.80.144.255 port 43937
2020-05-13 09:04:58
223.71.167.166 attackbotsspam
May 13 01:59:23 debian-2gb-nbg1-2 kernel: \[11586823.669271\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=223.71.167.166 DST=195.201.40.59 LEN=44 TOS=0x04 PREC=0x00 TTL=114 ID=40995 PROTO=TCP SPT=46767 DPT=3780 WINDOW=29200 RES=0x00 SYN URGP=0
2020-05-13 09:04:45
181.137.134.13 attackspam
Automatic report - Port Scan Attack
2020-05-13 08:30:48
66.249.65.208 attack
[Wed May 13 04:11:06.794323 2020] [:error] [pid 18791:tid 140684858341120] [client 66.249.65.208:62133] [client 66.249.65.208] ModSecurity: Access denied with code 403 (phase 2). Pattern match "((?:[~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\"'\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98`<>][^~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\"'\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98`<>]*?){6})" at ARGS:id. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "1526"] [id "942431"] [msg "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)"] [data "Matched Data: :kalender-tanam-katam-terpadu-kecamatan- found within ARGS:id: 1670:kalender-tanam-katam-terpadu-kecamatan-bendungan-kabupaten-trenggalek-tahun-2016-2017"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag 
...
2020-05-13 08:32:34
189.112.12.107 attackbotsspam
May 12 19:13:40 NPSTNNYC01T sshd[29676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.12.107
May 12 19:13:42 NPSTNNYC01T sshd[29676]: Failed password for invalid user ubuntu from 189.112.12.107 port 53089 ssh2
May 12 19:18:16 NPSTNNYC01T sshd[30115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.12.107
...
2020-05-13 08:39:30
112.218.248.58 attack
Email rejected due to spam filtering
2020-05-13 08:45:01
222.186.173.180 attackspam
2020-05-13T00:37:51.651640shield sshd\[7733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
2020-05-13T00:37:53.350274shield sshd\[7733\]: Failed password for root from 222.186.173.180 port 18266 ssh2
2020-05-13T00:37:57.024087shield sshd\[7733\]: Failed password for root from 222.186.173.180 port 18266 ssh2
2020-05-13T00:38:00.264851shield sshd\[7733\]: Failed password for root from 222.186.173.180 port 18266 ssh2
2020-05-13T00:38:03.918043shield sshd\[7733\]: Failed password for root from 222.186.173.180 port 18266 ssh2
2020-05-13 08:43:45
192.248.41.52 attackbots
5x Failed Password
2020-05-13 08:36:07
138.68.2.4 attackbots
CMS (WordPress or Joomla) login attempt.
2020-05-13 09:07:03
159.89.40.238 attackbotsspam
SSH brute force
2020-05-13 08:39:45
110.138.148.101 attackspambots
2020-05-13 08:33:54

Recently Reported IPs

167.172.206.180 136.254.211.51 97.111.207.190 157.245.175.51
207.158.104.5 97.251.53.27 47.247.94.228 163.49.63.51
18.181.42.61 84.224.237.44 89.180.117.14 133.198.245.142
139.235.59.72 190.16.201.97 71.181.168.253 95.212.167.86
203.61.127.46 33.11.108.123 39.115.53.149 54.180.17.173