Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.80.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11471
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.80.142.			IN	A

;; AUTHORITY SECTION:
.			339	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 213 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 11:42:49 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 142.80.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.80.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.111.77.246 attackbotsspam
SASL Brute Force
2019-11-03 17:16:11
113.131.200.22 attackbots
9527/tcp
[2019-11-03]1pkt
2019-11-03 17:39:19
159.203.77.51 attackspambots
Invalid user usuario from 159.203.77.51 port 51984
2019-11-03 17:17:16
103.242.13.70 attackbots
Nov  3 06:46:23 apollo sshd\[21832\]: Invalid user complex from 103.242.13.70Nov  3 06:46:25 apollo sshd\[21832\]: Failed password for invalid user complex from 103.242.13.70 port 51744 ssh2Nov  3 06:51:42 apollo sshd\[21874\]: Failed password for root from 103.242.13.70 port 39910 ssh2
...
2019-11-03 17:24:56
113.228.177.167 attack
60001/tcp
[2019-11-03]1pkt
2019-11-03 17:15:17
173.208.197.85 attackbotsspam
1433/tcp
[2019-11-03]1pkt
2019-11-03 17:28:43
95.28.165.124 attackbotsspam
445/tcp
[2019-11-03]1pkt
2019-11-03 17:32:07
222.186.175.148 attackbots
2019-11-03T10:04:58.220703scmdmz1 sshd\[15858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
2019-11-03T10:05:00.031659scmdmz1 sshd\[15858\]: Failed password for root from 222.186.175.148 port 4460 ssh2
2019-11-03T10:05:04.877293scmdmz1 sshd\[15858\]: Failed password for root from 222.186.175.148 port 4460 ssh2
...
2019-11-03 17:13:44
221.203.149.119 attackbotsspam
8080/tcp
[2019-11-03]1pkt
2019-11-03 17:32:42
191.248.116.112 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/191.248.116.112/ 
 
 AU - 1H : (40)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AU 
 NAME ASN : ASN18881 
 
 IP : 191.248.116.112 
 
 CIDR : 191.248.96.0/19 
 
 PREFIX COUNT : 938 
 
 UNIQUE IP COUNT : 4233472 
 
 
 ATTACKS DETECTED ASN18881 :  
  1H - 3 
  3H - 5 
  6H - 13 
 12H - 29 
 24H - 60 
 
 DateTime : 2019-11-03 06:51:58 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-03 17:12:57
49.88.112.113 attackspam
5x Failed Password
2019-11-03 17:28:28
163.172.61.214 attackbots
Invalid user user from 163.172.61.214 port 49332
2019-11-03 17:20:39
150.129.105.12 attackspambots
445/tcp
[2019-11-03]1pkt
2019-11-03 17:48:36
195.154.191.151 attack
$f2bV_matches
2019-11-03 17:47:39
185.216.140.252 attack
11/03/2019-04:00:51.847881 185.216.140.252 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-03 17:43:17

Recently Reported IPs

1.20.71.230 1.20.80.156 104.16.126.28 1.20.80.186
1.20.80.173 1.20.80.2 1.20.80.182 1.20.80.16
1.20.80.194 1.20.80.232 1.20.80.240 1.20.80.26
1.20.80.30 1.20.80.37 1.20.80.58 1.20.80.81
104.16.130.6 1.20.80.96 1.20.80.87 1.20.80.99