Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.239.140.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38700
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.239.140.67.			IN	A

;; AUTHORITY SECTION:
.			451	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090601 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 07 08:28:04 CST 2020
;; MSG SIZE  rcvd: 117
Host info
67.140.239.80.in-addr.arpa domain name pointer 80-239-140-67.teliacarrier-cust.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
67.140.239.80.in-addr.arpa	name = 80-239-140-67.teliacarrier-cust.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.245.82.18 attackspam
Automatic report - Port Scan Attack
2020-07-31 05:58:12
149.202.69.159 attackspam
*Port Scan* detected from 149.202.69.159 (FR/France/Hauts-de-France/Gravelines/ns3012242.ip-149-202-69.eu). 4 hits in the last 131 seconds
2020-07-31 05:46:12
185.156.73.50 attack
Port scan: Attack repeated for 24 hours
2020-07-31 06:11:27
106.53.9.137 attackbots
SSH Invalid Login
2020-07-31 05:48:53
170.130.45.47 attackbots
Jul 30 07:28:02 geralt postfix/smtpd[837]: NOQUEUE: reject: RCPT from unknown[170.130.45.47]: 554 5.7.1 : Recipient address rejected: Access denied; from= to= proto=ESMTP helo=
2020-07-31 06:04:23
222.186.173.154 attackspam
Jul 31 00:04:36 pve1 sshd[5614]: Failed password for root from 222.186.173.154 port 13634 ssh2
Jul 31 00:04:40 pve1 sshd[5614]: Failed password for root from 222.186.173.154 port 13634 ssh2
...
2020-07-31 06:10:52
221.229.218.50 attackspam
SSH Invalid Login
2020-07-31 06:21:27
212.64.91.114 attackspam
Invalid user xguest from 212.64.91.114 port 52878
2020-07-31 06:19:31
222.186.175.212 attack
Jul 30 23:44:15 ip106 sshd[878]: Failed password for root from 222.186.175.212 port 44938 ssh2
Jul 30 23:44:18 ip106 sshd[878]: Failed password for root from 222.186.175.212 port 44938 ssh2
...
2020-07-31 05:50:14
45.126.125.141 attackbots
60001/tcp
[2020-07-30]1pkt
2020-07-31 05:54:05
202.29.33.245 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-30T20:35:08Z and 2020-07-30T20:42:15Z
2020-07-31 05:51:59
60.28.60.49 attackspambots
SSH Invalid Login
2020-07-31 05:55:18
45.164.28.134 attack
Automatic report - Port Scan Attack
2020-07-31 06:07:29
118.89.242.138 attackspambots
Jul 30 18:20:44 ws12vmsma01 sshd[28345]: Failed password for root from 118.89.242.138 port 53914 ssh2
Jul 30 18:24:41 ws12vmsma01 sshd[28896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.242.138  user=root
Jul 30 18:24:44 ws12vmsma01 sshd[28896]: Failed password for root from 118.89.242.138 port 60802 ssh2
...
2020-07-31 06:01:44
101.71.129.48 attackspam
Invalid user muliao from 101.71.129.48 port 8793
2020-07-31 06:00:27

Recently Reported IPs

191.13.170.192 11.189.18.42 151.237.140.72 151.198.76.20
193.175.203.252 83.168.97.84 184.18.22.162 80.106.143.71
180.158.1.21 153.161.194.209 35.230.119.57 175.75.126.21
203.114.192.197 151.242.231.239 70.159.209.210 3.249.140.9
76.121.190.11 76.165.39.130 66.67.18.234 1.211.252.145