Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: The Hague

Region: South Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.80.1.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49694
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;83.80.1.200.			IN	A

;; AUTHORITY SECTION:
.			560	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100402 1800 900 604800 86400

;; Query time: 218 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 05 09:26:28 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 200.1.80.83.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 200.1.80.83.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
69.55.49.187 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-13 02:30:28
205.200.180.150 attackbots
Email rejected due to spam filtering
2020-09-13 02:13:55
122.166.237.117 attackspam
Invalid user srvadmin from 122.166.237.117 port 49748
2020-09-13 02:06:30
151.248.63.235 attackspam
Attempted Brute Force (dovecot)
2020-09-13 02:42:30
123.157.219.83 attack
2020-09-12T12:02:17.846421shield sshd\[13172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.157.219.83  user=root
2020-09-12T12:02:19.783639shield sshd\[13172\]: Failed password for root from 123.157.219.83 port 38118 ssh2
2020-09-12T12:04:26.973967shield sshd\[13831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.157.219.83  user=root
2020-09-12T12:04:29.618857shield sshd\[13831\]: Failed password for root from 123.157.219.83 port 53321 ssh2
2020-09-12T12:06:39.846123shield sshd\[14390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.157.219.83  user=root
2020-09-13 02:09:02
200.122.77.221 attackbots
Email rejected due to spam filtering
2020-09-13 02:08:43
211.34.36.217 attackbotsspam
 TCP (SYN) 211.34.36.217:35335 -> port 23, len 44
2020-09-13 02:13:28
80.82.77.221 attackspam
TCP ports : 1433 / 1434
2020-09-13 02:37:44
77.247.181.162 attack
2020-09-12T19:29[Censored Hostname] sshd[15667]: Failed password for root from 77.247.181.162 port 53610 ssh2
2020-09-12T19:29[Censored Hostname] sshd[15667]: Failed password for root from 77.247.181.162 port 53610 ssh2
2020-09-12T19:29[Censored Hostname] sshd[15667]: Failed password for root from 77.247.181.162 port 53610 ssh2[...]
2020-09-13 02:28:38
186.93.106.66 attack
Brute forcing RDP port 3389
2020-09-13 02:18:01
64.57.253.25 attackbotsspam
Sep 12 17:05:02 Ubuntu-1404-trusty-64-minimal sshd\[18292\]: Invalid user sir from 64.57.253.25
Sep 12 17:05:02 Ubuntu-1404-trusty-64-minimal sshd\[18292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.57.253.25
Sep 12 17:05:04 Ubuntu-1404-trusty-64-minimal sshd\[18292\]: Failed password for invalid user sir from 64.57.253.25 port 60744 ssh2
Sep 12 17:12:03 Ubuntu-1404-trusty-64-minimal sshd\[21109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.57.253.25  user=root
Sep 12 17:12:05 Ubuntu-1404-trusty-64-minimal sshd\[21109\]: Failed password for root from 64.57.253.25 port 47888 ssh2
2020-09-13 02:43:40
79.179.83.139 attackspam
Email rejected due to spam filtering
2020-09-13 02:16:24
162.142.125.34 attackbots
12.09.2020 18:49:10 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-09-13 02:18:37
185.239.242.84 attack
DATE:2020-09-11 18:50:18, IP:185.239.242.84, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-09-13 02:26:21
89.248.168.217 attack
Port Scan: UDP/1028
2020-09-13 02:34:30

Recently Reported IPs

85.207.30.43 189.217.148.12 204.124.226.81 196.49.125.193
148.113.236.108 12.147.171.183 183.95.24.136 173.144.252.151
153.129.135.56 4.15.123.91 219.128.248.144 93.199.157.42
33.248.174.197 189.172.4.23 97.191.106.68 68.202.38.157
67.158.215.156 165.102.252.184 146.245.243.20 210.40.18.78