Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 9.239.80.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12626
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;9.239.80.172.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 20:31:02 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 172.80.239.9.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.80.239.9.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.162.168 attack
Port Scan: TCP/5678
2019-11-11 02:24:04
117.80.237.18 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-11-11 01:59:37
61.177.172.128 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 55 - port: 22 proto: TCP cat: Misc Attack
2019-11-11 02:05:04
185.176.27.102 attackspam
Multiport scan : 7 ports scanned 5492 5494 5586 5587 5588 5680 5681
2019-11-11 01:55:28
211.144.1.166 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-11-11 02:11:33
185.175.93.25 attack
11/10/2019-17:21:49.251841 185.175.93.25 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-11 02:15:53
159.203.201.245 attack
ET DROP Dshield Block Listed Source group 1 - port: 19425 proto: TCP cat: Misc Attack
2019-11-11 01:57:37
80.82.77.139 attackspam
Multiport scan : 7 ports scanned 520 789 902 2181 6666 7777 11211
2019-11-11 02:03:27
185.153.196.80 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 4963 proto: TCP cat: Misc Attack
2019-11-11 02:16:12
185.176.27.14 attackspam
Multiport scan : 8 ports scanned 5480 5481 5495 5496 5497 5589 5590 5591
2019-11-11 02:15:13
94.191.20.179 attackspambots
Nov 10 17:08:22 zooi sshd[29977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.20.179
Nov 10 17:08:24 zooi sshd[29977]: Failed password for invalid user ftpuser from 94.191.20.179 port 37332 ssh2
...
2019-11-11 01:50:09
185.209.0.18 attack
Multiport scan : 32 ports scanned 4300 4301 4312 4313 4315 4317 4330 4336 4337 4339 4340 4342 4344 4345 4348 4349 4351 4352 4354 4359 4370 4372 4374 4377 4380 4383 4386 4390 4393 4396 4398 4399
2019-11-11 02:14:43
172.69.134.142 attack
ET INFO User-Agent (python-requests) Inbound to Webserver - port: 80 proto: TCP cat: Attempted Information Leak
2019-11-11 02:17:20
185.143.221.62 attack
ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 443 proto: TCP cat: Attempted Information Leak
2019-11-11 02:16:41
89.248.168.176 attack
Multiport scan : 6 ports scanned 6887 6888 6891 6900 6901 6913
2019-11-11 02:23:48

Recently Reported IPs

44.201.194.231 7.65.67.59 5.185.247.233 190.128.250.36
35.46.91.145 241.140.59.142 14.102.212.207 247.165.170.19
210.195.233.138 227.93.189.156 203.78.16.109 134.177.130.26
126.215.43.12 252.205.17.161 75.236.89.54 29.40.27.79
117.172.185.104 122.164.154.199 193.11.146.81 211.161.0.7