Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.234.13.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51451
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.234.13.234.			IN	A

;; AUTHORITY SECTION:
.			350	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 09:14:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 234.13.234.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.13.234.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.190.14 attackspambots
2020-07-06T10:24:20.385732lavrinenko.info sshd[20179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14  user=root
2020-07-06T10:24:22.558316lavrinenko.info sshd[20179]: Failed password for root from 222.186.190.14 port 16505 ssh2
2020-07-06T10:24:20.385732lavrinenko.info sshd[20179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14  user=root
2020-07-06T10:24:22.558316lavrinenko.info sshd[20179]: Failed password for root from 222.186.190.14 port 16505 ssh2
2020-07-06T10:24:29.685788lavrinenko.info sshd[20179]: Failed password for root from 222.186.190.14 port 16505 ssh2
...
2020-07-06 15:40:15
154.120.242.70 attack
Icarus honeypot on github
2020-07-06 15:40:46
82.166.192.22 attack
82.166.192.22 - - [06/Jul/2020:04:51:36 +0100] "POST /wp-login.php HTTP/1.1" 200 2082 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.166.192.22 - - [06/Jul/2020:04:51:38 +0100] "POST /wp-login.php HTTP/1.1" 200 2059 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.166.192.22 - - [06/Jul/2020:04:51:40 +0100] "POST /wp-login.php HTTP/1.1" 200 2063 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-06 15:32:09
37.58.52.149 attack
 UDP 37.58.52.149:55025 -> port 123, len 220
2020-07-06 15:30:10
148.229.3.242 attackbots
Jul  6 06:50:23 XXX sshd[17765]: Invalid user limengze from 148.229.3.242 port 53124
2020-07-06 15:31:12
188.166.147.211 attackspambots
2020-07-06T04:05:53.631361shield sshd\[9397\]: Invalid user nl from 188.166.147.211 port 38742
2020-07-06T04:05:53.635941shield sshd\[9397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.147.211
2020-07-06T04:05:55.518647shield sshd\[9397\]: Failed password for invalid user nl from 188.166.147.211 port 38742 ssh2
2020-07-06T04:15:18.669836shield sshd\[13740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.147.211  user=root
2020-07-06T04:15:20.783399shield sshd\[13740\]: Failed password for root from 188.166.147.211 port 35078 ssh2
2020-07-06 15:06:19
111.231.243.21 attackspam
ssh brute force
2020-07-06 15:25:46
112.85.42.173 attackbotsspam
Jul  6 09:10:18 server sshd[453]: Failed none for root from 112.85.42.173 port 57124 ssh2
Jul  6 09:10:21 server sshd[453]: Failed password for root from 112.85.42.173 port 57124 ssh2
Jul  6 09:10:26 server sshd[453]: Failed password for root from 112.85.42.173 port 57124 ssh2
2020-07-06 15:18:47
182.74.25.246 attackspam
SSH Bruteforce attack
2020-07-06 15:34:59
64.227.26.221 attack
Jul  6 15:12:26 itachi1706steam sshd[30945]: Did not receive identification string from 64.227.26.221 port 36760
Jul  6 15:12:33 itachi1706steam sshd[30977]: Disconnected from authenticating user root 64.227.26.221 port 50704 [preauth]
...
2020-07-06 15:42:12
106.13.105.88 attackbots
Jul  6 05:51:28 lnxweb62 sshd[22949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.105.88
2020-07-06 15:44:58
52.57.69.140 attackspam
20 attempts against mh-ssh on frost
2020-07-06 15:21:06
187.18.108.73 attackspambots
Jul  6 07:45:58 ns381471 sshd[17405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.18.108.73
Jul  6 07:46:00 ns381471 sshd[17405]: Failed password for invalid user vak from 187.18.108.73 port 32810 ssh2
2020-07-06 15:34:35
51.137.134.191 attack
Jul  6 06:55:52 onepixel sshd[2523572]: Invalid user flf from 51.137.134.191 port 57444
Jul  6 06:55:52 onepixel sshd[2523572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.137.134.191 
Jul  6 06:55:52 onepixel sshd[2523572]: Invalid user flf from 51.137.134.191 port 57444
Jul  6 06:55:54 onepixel sshd[2523572]: Failed password for invalid user flf from 51.137.134.191 port 57444 ssh2
Jul  6 06:59:16 onepixel sshd[2525327]: Invalid user crl from 51.137.134.191 port 55766
2020-07-06 15:08:17
213.55.169.120 attackbotsspam
Jul  6 09:06:32 pkdns2 sshd\[58283\]: Invalid user 3 from 213.55.169.120Jul  6 09:06:34 pkdns2 sshd\[58283\]: Failed password for invalid user 3 from 213.55.169.120 port 59658 ssh2Jul  6 09:09:57 pkdns2 sshd\[58424\]: Invalid user usuario from 213.55.169.120Jul  6 09:09:59 pkdns2 sshd\[58424\]: Failed password for invalid user usuario from 213.55.169.120 port 54844 ssh2Jul  6 09:13:17 pkdns2 sshd\[58634\]: Invalid user ubuntu from 213.55.169.120Jul  6 09:13:19 pkdns2 sshd\[58634\]: Failed password for invalid user ubuntu from 213.55.169.120 port 50014 ssh2
...
2020-07-06 15:16:44

Recently Reported IPs

80.234.78.174 80.234.58.52 80.234.118.181 80.236.194.63
80.237.49.19 80.240.164.77 80.240.173.169 80.240.175.3
80.240.165.38 80.240.169.33 80.240.175.92 80.240.175.36
80.240.175.95 80.240.175.35 80.240.175.102 80.242.13.203
80.242.71.62 80.243.10.11 80.246.249.114 80.246.94.128