Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
80.232.183.230 attackbots
Invalid user eddie from 80.232.183.230 port 55574
2020-06-27 05:59:16
80.232.183.230 attack
SSH auth scanning - multiple failed logins
2020-06-22 05:07:45
80.232.183.230 attack
$f2bV_matches
2020-06-16 22:47:42
80.232.171.241 attackspambots
[Mon May 25 18:58:51 2020] - DDoS Attack From IP: 80.232.171.241 Port: 42542
2020-05-26 13:28:22
80.232.171.219 attack
Unauthorised access (Sep 14) SRC=80.232.171.219 LEN=40 TTL=57 ID=14057 TCP DPT=8080 WINDOW=60507 SYN 
Unauthorised access (Sep 13) SRC=80.232.171.219 LEN=40 TTL=57 ID=8011 TCP DPT=8080 WINDOW=60507 SYN 
Unauthorised access (Sep 12) SRC=80.232.171.219 LEN=40 TTL=57 ID=17045 TCP DPT=8080 WINDOW=60507 SYN 
Unauthorised access (Sep  8) SRC=80.232.171.219 LEN=40 TTL=57 ID=24151 TCP DPT=8080 WINDOW=18478 SYN 
Unauthorised access (Sep  8) SRC=80.232.171.219 LEN=40 TTL=57 ID=5699 TCP DPT=8080 WINDOW=18478 SYN
2019-09-14 15:04:30
80.232.171.219 attack
Unauthorised access (Aug 30) SRC=80.232.171.219 LEN=40 TTL=57 ID=56252 TCP DPT=8080 WINDOW=18478 SYN 
Unauthorised access (Aug 30) SRC=80.232.171.219 LEN=40 TTL=57 ID=64693 TCP DPT=8080 WINDOW=18478 SYN 
Unauthorised access (Aug 28) SRC=80.232.171.219 LEN=40 TTL=57 ID=31169 TCP DPT=8080 WINDOW=18478 SYN
2019-08-31 05:22:22
80.232.171.219 attackbots
Automatic report - Port Scan Attack
2019-07-16 06:57:37
80.232.171.219 attackspam
37215/tcp 37215/tcp
[2019-06-18/24]2pkt
2019-06-24 20:50:11
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.232.1.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15014
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.232.1.124.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020201 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 11:08:50 CST 2025
;; MSG SIZE  rcvd: 105
Host info
124.1.232.80.in-addr.arpa domain name pointer 80-232-1-124.telia-isp.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
124.1.232.80.in-addr.arpa	name = 80-232-1-124.telia-isp.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
82.221.128.191 attackbots
/viewforum.php?f=3
2020-01-15 04:49:25
77.81.230.143 attackbots
Unauthorized connection attempt detected from IP address 77.81.230.143 to port 2220 [J]
2020-01-15 04:51:10
104.244.78.231 attackspambots
Unauthorized access detected from banned ip
2020-01-15 04:46:00
110.80.142.84 attackbotsspam
Unauthorized connection attempt detected from IP address 110.80.142.84 to port 2220 [J]
2020-01-15 04:43:22
107.189.10.141 attackspam
Invalid user fake from 107.189.10.141 port 54490
2020-01-15 04:44:16
41.32.152.195 attackbots
Invalid user admin from 41.32.152.195 port 40045
2020-01-15 04:58:59
89.201.220.225 attack
Invalid user manager from 89.201.220.225 port 58211
2020-01-15 04:48:33
213.212.255.140 attackbots
Unauthorized connection attempt detected from IP address 213.212.255.140 to port 2220 [J]
2020-01-15 05:04:57
188.218.42.158 attack
detected by Fail2Ban
2020-01-15 05:10:38
106.52.21.41 attackspam
Unauthorized connection attempt detected from IP address 106.52.21.41 to port 2220 [J]
2020-01-15 04:44:29
138.97.94.114 attackspam
Invalid user admin from 138.97.94.114 port 41369
2020-01-15 04:40:33
27.34.8.120 attackbotsspam
Invalid user admin from 27.34.8.120 port 54638
2020-01-15 05:00:56
180.167.137.103 attackspambots
Unauthorized connection attempt detected from IP address 180.167.137.103 to port 2220 [J]
2020-01-15 05:14:17
134.209.64.10 attackspambots
Nov 16 11:31:10 odroid64 sshd\[26729\]: Invalid user emede from 134.209.64.10
Nov 16 11:31:10 odroid64 sshd\[26729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.64.10
...
2020-01-15 04:40:48
92.118.160.45 attack
Unauthorized connection attempt detected from IP address 92.118.160.45 to port 2121 [J]
2020-01-15 04:48:11

Recently Reported IPs

250.167.77.136 193.190.235.176 84.101.69.151 65.80.99.178
60.95.74.246 116.7.138.204 179.230.64.200 254.140.104.255
72.62.99.34 107.240.54.15 136.2.76.219 239.60.7.78
178.3.209.10 200.99.33.218 98.175.211.114 180.149.108.238
178.21.138.58 144.137.158.5 22.100.41.102 243.32.217.71