Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.180.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.180.33.			IN	A

;; AUTHORITY SECTION:
.			220	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 20:19:02 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 33.180.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 33.180.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.175.93.103 attack
12/24/2019-15:32:21.871645 185.175.93.103 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-25 05:47:42
92.118.160.17 attackbotsspam
Unauthorized connection attempt detected from IP address 92.118.160.17 to port 5905
2019-12-25 05:44:29
104.248.162.68 attackbots
Dec 24 10:01:26 eola postfix/smtpd[5396]: connect from unknown[104.248.162.68]
Dec 24 10:01:26 eola postfix/smtpd[5396]: lost connection after AUTH from unknown[104.248.162.68]
Dec 24 10:01:26 eola postfix/smtpd[5396]: disconnect from unknown[104.248.162.68] ehlo=1 auth=0/1 commands=1/2
Dec 24 10:01:26 eola postfix/smtpd[5396]: connect from unknown[104.248.162.68]
Dec 24 10:01:27 eola postfix/smtpd[5396]: lost connection after AUTH from unknown[104.248.162.68]
Dec 24 10:01:27 eola postfix/smtpd[5396]: disconnect from unknown[104.248.162.68] ehlo=1 auth=0/1 commands=1/2
Dec 24 10:01:27 eola postfix/smtpd[5396]: connect from unknown[104.248.162.68]
Dec 24 10:01:27 eola postfix/smtpd[5396]: lost connection after AUTH from unknown[104.248.162.68]
Dec 24 10:01:27 eola postfix/smtpd[5396]: disconnect from unknown[104.248.162.68] ehlo=1 auth=0/1 commands=1/2
Dec 24 10:01:27 eola postfix/smtpd[5396]: connect from unknown[104.248.162.68]
Dec 24 10:01:28 eola postfix/smtpd[5396]:........
-------------------------------
2019-12-25 05:50:58
112.35.26.43 attackspambots
Dec 24 16:28:13 mout sshd[15972]: Invalid user git12345 from 112.35.26.43 port 43790
2019-12-25 05:56:10
177.185.136.201 attack
Unauthorised access (Dec 24) SRC=177.185.136.201 LEN=48 TTL=109 ID=27965 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-25 06:00:55
14.241.182.103 attackspam
Bitcoin extortion email scam from a virus or trojan infected host
2019-12-25 05:56:23
159.203.7.81 attack
Invalid user admin from 159.203.7.81 port 48401
2019-12-25 06:04:28
46.229.168.163 attackspam
Unauthorized access detected from banned ip
2019-12-25 05:53:41
139.99.38.244 attack
Unauthorized connection attempt detected from IP address 139.99.38.244 to port 1433
2019-12-25 06:04:14
5.89.64.166 attack
no
2019-12-25 05:38:31
79.160.67.63 attackspambots
1577201339 - 12/24/2019 16:28:59 Host: 79.160.67.63/79.160.67.63 Port: 445 TCP Blocked
2019-12-25 05:33:01
202.69.36.119 attack
12/24/2019-16:27:53.394703 202.69.36.119 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-25 06:06:24
176.184.178.21 attackspam
2019-12-24T21:42:20.533794homeassistant sshd[14250]: Invalid user gellereau from 176.184.178.21 port 38189
2019-12-24T21:42:20.540184homeassistant sshd[14250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.184.178.21
...
2019-12-25 05:57:13
45.80.69.24 attackspam
Dec 24 16:34:19 nbi-636 sshd[662]: Invalid user admin from 45.80.69.24 port 34474
Dec 24 16:34:21 nbi-636 sshd[662]: Failed password for invalid user admin from 45.80.69.24 port 34474 ssh2
Dec 24 16:34:21 nbi-636 sshd[662]: Received disconnect from 45.80.69.24 port 34474:11: Bye Bye [preauth]
Dec 24 16:34:21 nbi-636 sshd[662]: Disconnected from 45.80.69.24 port 34474 [preauth]
Dec 24 16:40:25 nbi-636 sshd[1950]: Invalid user yukkei from 45.80.69.24 port 51042
Dec 24 16:40:27 nbi-636 sshd[1950]: Failed password for invalid user yukkei from 45.80.69.24 port 51042 ssh2
Dec 24 16:40:27 nbi-636 sshd[1950]: Received disconnect from 45.80.69.24 port 51042:11: Bye Bye [preauth]
Dec 24 16:40:27 nbi-636 sshd[1950]: Disconnected from 45.80.69.24 port 51042 [preauth]
Dec 24 16:45:00 nbi-636 sshd[3095]: User r.r from 45.80.69.24 not allowed because not listed in AllowUsers
Dec 24 16:45:00 nbi-636 sshd[3095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ........
-------------------------------
2019-12-25 05:35:54
187.161.146.19 attack
Brute-force attempt banned
2019-12-25 06:03:43

Recently Reported IPs

1.20.180.31 1.20.180.34 1.20.180.36 1.20.180.4
1.20.180.40 72.255.238.122 1.20.180.42 1.20.180.44
1.20.180.47 48.189.109.144 1.20.180.51 208.4.21.53
1.20.180.52 1.20.180.54 1.20.180.58 1.20.180.6
1.20.180.62 1.20.180.64 1.20.180.66 1.20.180.68