Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
80.240.141.20 attack
Aug 20 08:06:32 abendstille sshd\[1399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.240.141.20  user=root
Aug 20 08:06:34 abendstille sshd\[1399\]: Failed password for root from 80.240.141.20 port 59660 ssh2
Aug 20 08:11:23 abendstille sshd\[6073\]: Invalid user paola from 80.240.141.20
Aug 20 08:11:23 abendstille sshd\[6073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.240.141.20
Aug 20 08:11:25 abendstille sshd\[6073\]: Failed password for invalid user paola from 80.240.141.20 port 40254 ssh2
...
2020-08-20 19:05:19
80.240.141.20 attack
*Port Scan* detected from 80.240.141.20 (NL/Netherlands/North Holland/Amsterdam-Zuidoost/-). 4 hits in the last 255 seconds
2020-08-17 08:03:44
80.240.141.20 attackspambots
Invalid user user from 80.240.141.20 port 42852
2020-06-30 02:04:29
80.240.141.20 attackspambots
Jun 22 08:47:41 abendstille sshd\[12821\]: Invalid user xunjian from 80.240.141.20
Jun 22 08:47:41 abendstille sshd\[12821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.240.141.20
Jun 22 08:47:42 abendstille sshd\[12821\]: Failed password for invalid user xunjian from 80.240.141.20 port 53516 ssh2
Jun 22 08:51:39 abendstille sshd\[16799\]: Invalid user steven from 80.240.141.20
Jun 22 08:51:39 abendstille sshd\[16799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.240.141.20
...
2020-06-22 19:23:32
80.240.141.20 attack
Jun 10 09:36:38 ArkNodeAT sshd\[8841\]: Invalid user admin from 80.240.141.20
Jun 10 09:36:38 ArkNodeAT sshd\[8841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.240.141.20
Jun 10 09:36:40 ArkNodeAT sshd\[8841\]: Failed password for invalid user admin from 80.240.141.20 port 38274 ssh2
2020-06-10 16:30:21
80.240.141.20 attack
May 27 00:26:23 ns382633 sshd\[17854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.240.141.20  user=root
May 27 00:26:25 ns382633 sshd\[17854\]: Failed password for root from 80.240.141.20 port 36524 ssh2
May 27 00:36:57 ns382633 sshd\[19705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.240.141.20  user=root
May 27 00:36:59 ns382633 sshd\[19705\]: Failed password for root from 80.240.141.20 port 56774 ssh2
May 27 00:42:02 ns382633 sshd\[20606\]: Invalid user townsley from 80.240.141.20 port 34158
May 27 00:42:02 ns382633 sshd\[20606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.240.141.20
2020-05-27 06:47:57
80.240.141.20 attackspam
May 26 01:22:21 *** sshd[6314]: User root from 80.240.141.20 not allowed because not listed in AllowUsers
2020-05-26 10:48:26
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.240.141.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23394
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.240.141.97.			IN	A

;; AUTHORITY SECTION:
.			273	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022050101 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 02 08:49:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 97.141.240.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 97.141.240.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.247.111.10 attack
Unauthorized connection attempt from IP address 180.247.111.10 on Port 445(SMB)
2019-07-07 01:13:21
54.36.64.245 attackspam
Automatic report generated by Wazuh
2019-07-07 01:09:14
116.58.55.85 attackspam
firewall-block, port(s): 80/tcp
2019-07-07 00:54:11
185.176.27.174 attack
06.07.2019 15:53:27 Connection to port 10247 blocked by firewall
2019-07-07 00:41:43
191.53.59.187 attack
SMTP Fraud Orders
2019-07-07 00:38:16
41.235.13.235 attack
Jul  6 16:30:55 srv-4 sshd\[13404\]: Invalid user admin from 41.235.13.235
Jul  6 16:30:55 srv-4 sshd\[13404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.235.13.235
Jul  6 16:30:57 srv-4 sshd\[13404\]: Failed password for invalid user admin from 41.235.13.235 port 34433 ssh2
...
2019-07-07 00:26:00
151.106.11.188 attack
Scanning activity
2019-07-07 00:27:27
49.206.210.9 attack
Unauthorized connection attempt from IP address 49.206.210.9 on Port 445(SMB)
2019-07-07 00:32:55
14.102.93.108 attackbots
Unauthorized connection attempt from IP address 14.102.93.108 on Port 445(SMB)
2019-07-07 00:57:45
114.142.171.2 attack
Unauthorized connection attempt from IP address 114.142.171.2 on Port 445(SMB)
2019-07-07 00:53:40
106.51.72.240 attack
Jul  6 15:30:51 www sshd\[27748\]: Invalid user release from 106.51.72.240 port 33642
...
2019-07-07 00:32:03
36.226.112.162 attack
Unauthorized connection attempt from IP address 36.226.112.162 on Port 445(SMB)
2019-07-07 00:39:16
122.2.28.222 attackspam
Unauthorized connection attempt from IP address 122.2.28.222 on Port 445(SMB)
2019-07-07 00:31:35
139.59.78.236 attackspambots
SSH invalid-user multiple login attempts
2019-07-07 01:03:30
191.242.232.46 attackspambots
firewall-block, port(s): 445/tcp
2019-07-07 00:31:06

Recently Reported IPs

117.198.35.1 31.8.17.141 239.225.7.176 149.52.41.196
117.133.181.168 210.101.44.158 154.28.231.158 185.100.47.43
246.34.0.88 9.149.245.28 95.31.148.69 155.199.21.18
180.59.132.87 28.27.29.49 14.236.106.188 171.226.151.73
51.196.73.99 155.231.228.127 173.26.25.70 35.166.146.246