Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.80.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.80.194.			IN	A

;; AUTHORITY SECTION:
.			202	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 11:42:51 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 194.80.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.80.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
42.112.158.246 attackspam
Sun, 21 Jul 2019 18:26:47 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 10:04:32
185.10.68.50 attack
2019-07-21 23:12:59,273 [snip] proftpd[23302] [snip] (50.68.10.185.ro.ovo.sc[185.10.68.50]): USER %null%: no such user found from 50.68.10.185.ro.ovo.sc [185.10.68.50] to ::ffff:[snip]:22
2019-07-21 23:12:59,744 [snip] proftpd[23303] [snip] (50.68.10.185.ro.ovo.sc[185.10.68.50]): USER alabala123: no such user found from 50.68.10.185.ro.ovo.sc [185.10.68.50] to ::ffff:[snip]:22
2019-07-21 23:13:00,241 [snip] proftpd[23304] [snip] (50.68.10.185.ro.ovo.sc[185.10.68.50]): USER nologln: no such user found from 50.68.10.185.ro.ovo.sc [185.10.68.50] to ::ffff:[snip]:22[...]
2019-07-22 10:03:12
188.3.161.184 attack
Autoban   188.3.161.184 AUTH/CONNECT
2019-07-22 09:55:33
41.47.9.8 attackbots
Sun, 21 Jul 2019 18:26:49 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 09:57:06
188.235.138.182 attack
Autoban   188.235.138.182 AUTH/CONNECT
2019-07-22 10:13:22
138.186.251.253 attack
Jul 21 20:14:54 mxgate1 postfix/postscreen[3745]: CONNECT from [138.186.251.253]:36870 to [176.31.12.44]:25
Jul 21 20:14:54 mxgate1 postfix/dnsblog[3858]: addr 138.186.251.253 listed by domain bl.spamcop.net as 127.0.0.2
Jul 21 20:14:54 mxgate1 postfix/dnsblog[3899]: addr 138.186.251.253 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 21 20:14:54 mxgate1 postfix/dnsblog[3860]: addr 138.186.251.253 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 21 20:14:54 mxgate1 postfix/dnsblog[3860]: addr 138.186.251.253 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 21 20:14:54 mxgate1 postfix/dnsblog[3811]: addr 138.186.251.253 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 21 20:15:00 mxgate1 postfix/postscreen[3745]: DNSBL rank 5 for [138.186.251.253]:36870
Jul x@x
Jul 21 20:15:01 mxgate1 postfix/postscreen[3745]: HANGUP after 0.77 from [138.186.251.253]:36870 in tests after SMTP handshake
Jul 21 20:15:01 mxgate1 postfix/postscreen[3745]: DISCONNECT [138.186.251.2........
-------------------------------
2019-07-22 10:20:18
188.252.199.222 attackspambots
Autoban   188.252.199.222 AUTH/CONNECT
2019-07-22 10:05:09
188.162.166.248 attackspam
Autoban   188.162.166.248 AUTH/CONNECT
2019-07-22 10:19:42
188.147.181.77 attackbotsspam
Autoban   188.147.181.77 AUTH/CONNECT
2019-07-22 10:25:06
188.253.224.177 attackbots
Autoban   188.253.224.177 AUTH/CONNECT
2019-07-22 10:02:14
117.102.66.22 attackbotsspam
Sun, 21 Jul 2019 18:26:52 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 09:44:02
131.221.211.65 attackspam
Sun, 21 Jul 2019 18:26:48 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 09:59:08
188.3.192.22 attackbots
Autoban   188.3.192.22 AUTH/CONNECT
2019-07-22 09:52:15
108.222.68.232 attackspam
2019-07-22T01:32:53.308429abusebot-7.cloudsearch.cf sshd\[5705\]: Invalid user membership from 108.222.68.232 port 43314
2019-07-22 09:59:33
157.119.28.69 attackbotsspam
SMB Server BruteForce Attack
2019-07-22 09:43:11

Recently Reported IPs

1.20.80.16 1.20.80.232 1.20.80.240 1.20.80.26
1.20.80.30 1.20.80.37 1.20.80.58 1.20.80.81
104.16.130.6 1.20.80.96 1.20.80.87 1.20.80.99
1.20.80.40 1.20.80.70 1.20.81.110 1.20.81.130
1.20.81.107 1.20.81.136 1.20.81.162 1.20.81.177