Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: Incrediserve Ltd

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
villaromeo.de 80.82.64.213 [16/Jul/2020:07:07:38 +0200] "POST /xmlrpc.php HTTP/1.1" 200 580 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 Safari/537.36"
villaromeo.de 80.82.64.213 [16/Jul/2020:07:07:39 +0200] "POST /xmlrpc.php HTTP/1.1" 200 580 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 Safari/537.36"
2020-07-16 16:55:47
attackspam
Attempt to log in with non-existing username: admin
2020-06-18 13:42:01
attack
WordPress brute force
2020-04-30 05:09:35
attackbotsspam
Automatic report - WordPress Brute Force
2020-04-02 03:02:42
attackbotsspam
ft-1848-fussball.de 80.82.64.213 \[31/Oct/2019:09:13:54 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 666 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/74.0.3729.169 Safari/537.36"
ft-1848-fussball.de 80.82.64.213 \[31/Oct/2019:09:13:57 +0100\] "POST /wp-login.php HTTP/1.1" 200 5241 "http://ft-1848-fussball.de/wp-login.php" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/74.0.3729.169 Safari/537.36"
2019-10-31 17:32:53
Comments on same subnet:
IP Type Details Datetime
80.82.64.73 attackbots
[MultiHost/MultiPort scan (8)] tcp/110, tcp/135, tcp/143, tcp/20, tcp/21, tcp/22, tcp/23, tcp/81
[scan/connect: 10 time(s)]
*(RWIN=1024)(10130956)
2020-10-14 04:33:11
80.82.64.73 attackspambots
[MultiHost/MultiPort scan (8)] tcp/110, tcp/135, tcp/143, tcp/20, tcp/21, tcp/22, tcp/23, tcp/81
[scan/connect: 10 time(s)]
*(RWIN=1024)(10130956)
2020-10-13 20:01:42
80.82.64.140 attackspambots
Sep 11 23:55:54 *hidden* postfix/postscreen[45228]: DNSBL rank 3 for [80.82.64.140]:62033
2020-10-10 22:52:52
80.82.64.140 attackspam
Sep 11 23:55:54 *hidden* postfix/postscreen[45228]: DNSBL rank 3 for [80.82.64.140]:62033
2020-10-10 14:44:22
80.82.64.4 attack
Port Scan
...
2020-10-08 21:09:40
80.82.64.4 attackspam
Port Scan
...
2020-10-08 13:04:46
80.82.64.4 attack
Port Scan
...
2020-10-08 08:25:34
80.82.64.98 attackspam
TCP port : 16499
2020-09-25 02:25:49
80.82.64.98 attackbots
Port scan on 18 port(s): 16018 16063 16266 16388 16480 16505 16516 16519 16536 16580 16600 16629 16647 16706 16719 16824 16835 16877
2020-09-24 18:06:54
80.82.64.98 attackbots
[H1.VM10] Blocked by UFW
2020-09-23 23:38:13
80.82.64.98 attack
Port scan on 4 port(s): 16148 16222 16388 16550
2020-09-23 15:49:33
80.82.64.98 attack
Port scan on 16 port(s): 16014 16198 16206 16356 16457 16466 16508 16519 16577 16585 16612 16708 16826 16925 16979 16992
2020-09-23 07:44:44
80.82.64.99 attackspambots
Fail2Ban - SMTP Bruteforce Attempt
2020-09-21 03:24:06
80.82.64.99 attackbots
Fail2Ban - SMTP Bruteforce Attempt
2020-09-20 19:30:07
80.82.64.242 attackbots
port
2020-09-15 02:25:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.82.64.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.82.64.213.			IN	A

;; AUTHORITY SECTION:
.			578	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103100 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 17:32:49 CST 2019
;; MSG SIZE  rcvd: 116
Host info
213.64.82.80.in-addr.arpa domain name pointer no-reverse-dns-configured.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.64.82.80.in-addr.arpa	name = no-reverse-dns-configured.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.234.99.208 attackbots
Oct  5 17:25:27 markkoudstaal sshd[32572]: Failed password for root from 49.234.99.208 port 58480 ssh2
Oct  5 17:33:30 markkoudstaal sshd[2324]: Failed password for root from 49.234.99.208 port 40952 ssh2
...
2020-10-05 23:47:14
94.191.88.34 attackspam
Oct  5 17:28:13 fhem-rasp sshd[18454]: Failed password for root from 94.191.88.34 port 53718 ssh2
Oct  5 17:28:15 fhem-rasp sshd[18454]: Disconnected from authenticating user root 94.191.88.34 port 53718 [preauth]
...
2020-10-06 00:06:15
112.248.98.47 attackspam
SSH login attempts.
2020-10-06 00:04:44
94.107.1.247 attackbotsspam
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=64091  .  dstport=445 SMB  .     (3534)
2020-10-05 23:40:49
106.77.48.250 attackbots
20/10/4@16:38:25: FAIL: Alarm-Intrusion address from=106.77.48.250
20/10/4@16:38:26: FAIL: Alarm-Intrusion address from=106.77.48.250
...
2020-10-05 23:55:00
139.155.13.21 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-05 23:49:56
124.156.140.217 attackspam
Oct  5 16:33:50 ns382633 sshd\[11262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.140.217  user=root
Oct  5 16:33:51 ns382633 sshd\[11262\]: Failed password for root from 124.156.140.217 port 46590 ssh2
Oct  5 16:47:34 ns382633 sshd\[13086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.140.217  user=root
Oct  5 16:47:36 ns382633 sshd\[13086\]: Failed password for root from 124.156.140.217 port 58402 ssh2
Oct  5 16:50:43 ns382633 sshd\[13457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.140.217  user=root
2020-10-06 00:02:39
157.92.49.151 attackbotsspam
$f2bV_matches
2020-10-06 00:05:44
180.76.158.224 attackspam
$f2bV_matches
2020-10-05 23:45:50
61.177.172.104 attack
[MK-Root1] SSH login failed
2020-10-05 23:49:00
177.1.213.19 attack
Oct  5 18:03:11 host1 sshd[1223380]: Failed password for root from 177.1.213.19 port 38420 ssh2
Oct  5 18:07:42 host1 sshd[1223755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.213.19  user=root
Oct  5 18:07:45 host1 sshd[1223755]: Failed password for root from 177.1.213.19 port 44220 ssh2
Oct  5 18:07:42 host1 sshd[1223755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.213.19  user=root
Oct  5 18:07:45 host1 sshd[1223755]: Failed password for root from 177.1.213.19 port 44220 ssh2
...
2020-10-06 00:11:48
112.160.152.199 attackspambots
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=50851  .  dstport=23 Telnet  .     (3527)
2020-10-06 00:15:18
91.190.232.9 attack
Icarus honeypot on github
2020-10-06 00:06:43
120.131.3.191 attackbots
Oct  5 13:51:37 ns3033917 sshd[22336]: Failed password for root from 120.131.3.191 port 63672 ssh2
Oct  5 13:59:37 ns3033917 sshd[22374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.3.191  user=root
Oct  5 13:59:40 ns3033917 sshd[22374]: Failed password for root from 120.131.3.191 port 16436 ssh2
...
2020-10-06 00:18:37
106.12.4.158 attackbots
$f2bV_matches
2020-10-05 23:54:31

Recently Reported IPs

183.8.238.24 11.97.134.135 249.88.114.112 202.247.86.206
67.199.154.71 64.203.170.198 72.253.156.40 32.103.231.24
233.102.79.85 68.225.92.213 115.63.225.32 158.126.172.119
103.30.95.66 111.116.227.9 106.118.217.213 205.85.35.101
158.143.156.194 114.218.193.144 46.40.240.199 246.179.56.249