Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.243.8.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.243.8.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030901 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 10 05:32:57 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 40.8.243.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.8.243.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.209.10.41 attackspambots
Brute force SMTP login attempted.
...
2019-08-10 06:03:34
134.175.141.166 attackspam
Aug  9 21:50:40 marvibiene sshd[25947]: Invalid user tomas from 134.175.141.166 port 51317
Aug  9 21:50:40 marvibiene sshd[25947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.141.166
Aug  9 21:50:40 marvibiene sshd[25947]: Invalid user tomas from 134.175.141.166 port 51317
Aug  9 21:50:42 marvibiene sshd[25947]: Failed password for invalid user tomas from 134.175.141.166 port 51317 ssh2
...
2019-08-10 06:37:55
74.82.47.3 attackspambots
scan z
2019-08-10 06:07:56
134.175.42.162 attackbots
Brute force SMTP login attempted.
...
2019-08-10 06:17:45
167.114.251.164 attackspam
Aug  9 22:44:05 srv-4 sshd\[8201\]: Invalid user wr from 167.114.251.164
Aug  9 22:44:05 srv-4 sshd\[8201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.251.164
Aug  9 22:44:07 srv-4 sshd\[8201\]: Failed password for invalid user wr from 167.114.251.164 port 60683 ssh2
...
2019-08-10 06:00:09
221.120.224.146 attackbots
Unauthorized connection attempt from IP address 221.120.224.146 on Port 445(SMB)
2019-08-10 06:38:28
134.175.154.182 attackspambots
Brute force SMTP login attempted.
...
2019-08-10 06:36:59
134.175.31.105 attack
Aug  9 22:31:42 vps65 sshd\[17127\]: Invalid user virgil from 134.175.31.105 port 52562
Aug  9 22:31:42 vps65 sshd\[17127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.31.105
...
2019-08-10 06:23:10
134.209.126.219 attackspambots
Brute force SMTP login attempted.
...
2019-08-10 05:56:58
134.209.11.199 attackspambots
Brute force SMTP login attempted.
...
2019-08-10 05:59:43
134.175.49.215 attack
Brute force SMTP login attempted.
...
2019-08-10 06:15:38
78.186.208.216 attackbotsspam
Aug  9 19:31:32 herz-der-gamer sshd[28080]: Invalid user weblogic from 78.186.208.216 port 34458
Aug  9 19:31:32 herz-der-gamer sshd[28080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.186.208.216
Aug  9 19:31:32 herz-der-gamer sshd[28080]: Invalid user weblogic from 78.186.208.216 port 34458
Aug  9 19:31:35 herz-der-gamer sshd[28080]: Failed password for invalid user weblogic from 78.186.208.216 port 34458 ssh2
...
2019-08-10 05:57:16
134.175.205.46 attackspambots
Brute force SMTP login attempted.
...
2019-08-10 06:30:26
134.175.80.27 attackbots
Brute force SMTP login attempted.
...
2019-08-10 06:08:49
177.55.159.19 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-10 06:22:36

Recently Reported IPs

201.168.22.81 70.13.93.231 86.107.83.51 85.238.102.132
194.118.217.69 119.59.131.180 252.146.81.109 8.80.76.249
16.243.238.226 77.170.244.211 191.102.153.130 219.208.114.210
194.65.228.10 215.0.134.171 135.132.57.144 24.106.143.239
49.64.234.151 140.118.222.209 49.137.254.254 203.192.243.239