Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nairobi

Region: Nairobi

Country: Kenya

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.240.205.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47825
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.240.205.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024112602 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 27 12:22:28 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 213.205.240.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.205.240.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.113 attackspam
SSHD unauthorised connection attempt (b)
2020-04-17 19:35:42
162.255.118.51 attackspam
From: Auto Warranty Repair = contact@evet.club
2020-04-17 19:37:37
80.82.77.245 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-17 19:16:55
139.59.61.118 attack
Apr 17 12:48:44 h2779839 sshd[12000]: Invalid user admin from 139.59.61.118 port 40478
Apr 17 12:48:44 h2779839 sshd[12000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.61.118
Apr 17 12:48:44 h2779839 sshd[12000]: Invalid user admin from 139.59.61.118 port 40478
Apr 17 12:48:46 h2779839 sshd[12000]: Failed password for invalid user admin from 139.59.61.118 port 40478 ssh2
Apr 17 12:53:04 h2779839 sshd[12097]: Invalid user admin from 139.59.61.118 port 49260
Apr 17 12:53:04 h2779839 sshd[12097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.61.118
Apr 17 12:53:04 h2779839 sshd[12097]: Invalid user admin from 139.59.61.118 port 49260
Apr 17 12:53:05 h2779839 sshd[12097]: Failed password for invalid user admin from 139.59.61.118 port 49260 ssh2
Apr 17 12:57:32 h2779839 sshd[12343]: Invalid user admin from 139.59.61.118 port 58040
...
2020-04-17 19:29:40
42.52.201.154 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-17 19:54:51
194.0.252.57 attackspambots
Apr 17 12:50:26 server sshd[30425]: Failed password for invalid user amin2 from 194.0.252.57 port 55678 ssh2
Apr 17 12:53:55 server sshd[31004]: Failed password for root from 194.0.252.57 port 59159 ssh2
Apr 17 12:57:15 server sshd[31619]: Failed password for invalid user git from 194.0.252.57 port 34388 ssh2
2020-04-17 19:58:55
194.26.29.120 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-17 19:52:21
181.48.42.234 attack
1587121049 - 04/17/2020 12:57:29 Host: 181.48.42.234/181.48.42.234 Port: 445 TCP Blocked
2020-04-17 19:37:17
24.7.10.241 attackspam
WEB_SERVER 403 Forbidden
2020-04-17 19:23:49
211.238.170.168 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-17 19:31:56
71.10.112.17 attackspambots
WEB_SERVER 403 Forbidden
2020-04-17 19:47:24
118.89.27.72 attack
Apr 17 13:31:23 host sshd[57287]: Invalid user ht from 118.89.27.72 port 37274
...
2020-04-17 19:35:08
109.93.67.40 attack
Apr 17 12:54:24 v22018086721571380 sshd[30445]: Failed password for invalid user oo from 109.93.67.40 port 37326 ssh2
2020-04-17 19:52:48
171.38.194.171 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-17 19:20:31
210.123.251.225 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-17 19:27:01

Recently Reported IPs

174.189.240.109 160.119.77.24 14.191.253.230 241.102.217.99
172.47.56.62 114.107.28.255 26.19.104.97 172.23.0.177
180.13.200.148 146.76.13.46 174.162.163.105 118.189.41.40
172.236.79.49 216.177.77.125 147.36.248.34 77.155.34.40
143.18.164.221 112.248.80.236 146.201.141.0 172.54.10.58