Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.241.216.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6203
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.241.216.204.			IN	A

;; AUTHORITY SECTION:
.			376	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 18:16:52 CST 2022
;; MSG SIZE  rcvd: 107
Host info
204.216.241.80.in-addr.arpa domain name pointer spielwiese.petzsch.eu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
204.216.241.80.in-addr.arpa	name = spielwiese.petzsch.eu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.187.181.155 attackspambots
$f2bV_matches
2020-09-28 13:46:10
218.92.0.175 attackspam
Sep 27 18:39:24 auw2 sshd\[759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Sep 27 18:39:26 auw2 sshd\[759\]: Failed password for root from 218.92.0.175 port 53577 ssh2
Sep 27 18:39:39 auw2 sshd\[759\]: Failed password for root from 218.92.0.175 port 53577 ssh2
Sep 27 18:39:46 auw2 sshd\[772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Sep 27 18:39:48 auw2 sshd\[772\]: Failed password for root from 218.92.0.175 port 13065 ssh2
2020-09-28 13:18:25
39.48.78.101 attackspam
/wp-login.php
2020-09-28 13:23:24
103.45.70.58 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-09-28 13:48:09
49.234.33.229 attack
Sep 28 01:46:12 root sshd[12276]: Invalid user maria from 49.234.33.229
...
2020-09-28 13:12:29
125.88.169.233 attackspambots
2020-09-28T08:13:00.749135hostname sshd[1579]: Failed password for invalid user caja01 from 125.88.169.233 port 32799 ssh2
2020-09-28T08:17:57.633036hostname sshd[3525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.88.169.233  user=root
2020-09-28T08:17:59.338599hostname sshd[3525]: Failed password for root from 125.88.169.233 port 57281 ssh2
...
2020-09-28 13:26:54
139.199.94.51 attackspambots
Sep 28 04:21:29 inter-technics sshd[11309]: Invalid user oracle from 139.199.94.51 port 59024
Sep 28 04:21:29 inter-technics sshd[11309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.94.51
Sep 28 04:21:29 inter-technics sshd[11309]: Invalid user oracle from 139.199.94.51 port 59024
Sep 28 04:21:30 inter-technics sshd[11309]: Failed password for invalid user oracle from 139.199.94.51 port 59024 ssh2
Sep 28 04:25:09 inter-technics sshd[11600]: Invalid user deploy from 139.199.94.51 port 44354
...
2020-09-28 13:17:21
121.196.9.87 attack
Port Scan
...
2020-09-28 13:51:22
218.56.11.181 attackspambots
$f2bV_matches
2020-09-28 13:49:40
151.236.59.142 attack
Sep 28 07:18:51 h2646465 sshd[9200]: Invalid user mmk from 151.236.59.142
Sep 28 07:18:51 h2646465 sshd[9200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.236.59.142
Sep 28 07:18:51 h2646465 sshd[9200]: Invalid user mmk from 151.236.59.142
Sep 28 07:18:54 h2646465 sshd[9200]: Failed password for invalid user mmk from 151.236.59.142 port 49200 ssh2
Sep 28 07:33:04 h2646465 sshd[11119]: Invalid user coremail from 151.236.59.142
Sep 28 07:33:04 h2646465 sshd[11119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.236.59.142
Sep 28 07:33:04 h2646465 sshd[11119]: Invalid user coremail from 151.236.59.142
Sep 28 07:33:07 h2646465 sshd[11119]: Failed password for invalid user coremail from 151.236.59.142 port 58150 ssh2
Sep 28 07:36:32 h2646465 sshd[11685]: Invalid user account from 151.236.59.142
...
2020-09-28 13:37:11
185.202.2.147 attackspam
SSH Bruteforce Attempt on Honeypot
2020-09-28 13:52:44
165.232.126.142 attackbotsspam
$f2bV_matches
2020-09-28 13:21:27
167.71.237.73 attackspambots
Sep 27 22:04:17 NPSTNNYC01T sshd[3584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.237.73
Sep 27 22:04:19 NPSTNNYC01T sshd[3584]: Failed password for invalid user postgres from 167.71.237.73 port 48690 ssh2
Sep 27 22:08:28 NPSTNNYC01T sshd[4094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.237.73
...
2020-09-28 13:53:18
49.88.112.111 attack
Sep 28 12:07:37 webhost01 sshd[9050]: Failed password for root from 49.88.112.111 port 10164 ssh2
...
2020-09-28 13:33:15
106.75.148.111 attackspambots
Invalid user test7 from 106.75.148.111 port 53956
2020-09-28 13:24:26

Recently Reported IPs

80.242.99.226 80.244.243.158 80.245.233.59 80.246.81.148
80.244.33.162 80.246.94.195 80.244.33.25 80.246.14.2
80.249.131.116 80.246.94.245 80.249.160.226 80.251.250.81
80.252.224.97 80.251.149.18 80.27.128.138 80.248.78.177
80.27.147.131 80.254.99.184 80.28.253.194 80.29.29.89