Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.31.39.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22972
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.31.39.80.			IN	A

;; AUTHORITY SECTION:
.			508	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023080701 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Aug 08 13:30:06 CST 2023
;; MSG SIZE  rcvd: 105
Host info
80.39.31.103.in-addr.arpa domain name pointer alpha.ns.nusadns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.39.31.103.in-addr.arpa	name = alpha.ns.nusadns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.61.176.220 attackspam
SSH Authentication Attempts Exceeded
2020-04-07 07:51:29
211.254.221.70 attack
Apr  6 23:20:14 *** sshd[24960]: Invalid user castis from 211.254.221.70
2020-04-07 07:36:22
90.15.70.139 attack
Port 22 Scan, PTR: None
2020-04-07 07:29:43
95.91.33.17 attack
20 attempts against mh-misbehave-ban on sonic
2020-04-07 07:43:00
64.227.20.221 attack
$f2bV_matches
2020-04-07 07:45:19
45.173.5.38 attackbotsspam
Draytek Vigor Remote Command Execution Vulnerability
2020-04-07 07:37:55
163.172.230.4 attack
[2020-04-06 19:28:01] NOTICE[12114][C-00002418] chan_sip.c: Call from '' (163.172.230.4:61770) to extension '911011972592277524' rejected because extension not found in context 'public'.
[2020-04-06 19:28:01] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-06T19:28:01.788-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="911011972592277524",SessionID="0x7f020c04b958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.230.4/61770",ACLName="no_extension_match"
[2020-04-06 19:32:51] NOTICE[12114][C-0000241d] chan_sip.c: Call from '' (163.172.230.4:62059) to extension '41011972592277524' rejected because extension not found in context 'public'.
[2020-04-06 19:32:51] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-06T19:32:51.417-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="41011972592277524",SessionID="0x7f020c0db748",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddr
...
2020-04-07 07:35:24
24.221.19.57 attack
$f2bV_matches
2020-04-07 07:48:09
139.59.43.6 attackbotsspam
Apr  6 17:44:11 server1 sshd\[30980\]: Invalid user test from 139.59.43.6
Apr  6 17:44:11 server1 sshd\[30980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.43.6 
Apr  6 17:44:13 server1 sshd\[30980\]: Failed password for invalid user test from 139.59.43.6 port 51154 ssh2
Apr  6 17:48:28 server1 sshd\[32216\]: Invalid user tmp from 139.59.43.6
Apr  6 17:48:28 server1 sshd\[32216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.43.6 
...
2020-04-07 08:05:42
76.70.135.181 attackspam
SSH brute-force attempt
2020-04-07 07:39:34
103.80.113.90 attackspambots
Repeated attempts against wp-login
2020-04-07 07:35:05
68.199.32.207 attack
Port 22 Scan, PTR: None
2020-04-07 07:32:06
186.147.129.110 attackbots
Apr  7 02:14:28 itv-usvr-02 sshd[22054]: Invalid user admin from 186.147.129.110 port 39818
Apr  7 02:14:28 itv-usvr-02 sshd[22054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.129.110
Apr  7 02:14:28 itv-usvr-02 sshd[22054]: Invalid user admin from 186.147.129.110 port 39818
Apr  7 02:14:29 itv-usvr-02 sshd[22054]: Failed password for invalid user admin from 186.147.129.110 port 39818 ssh2
Apr  7 02:19:04 itv-usvr-02 sshd[22165]: Invalid user jenkins from 186.147.129.110 port 50612
2020-04-07 07:41:24
206.189.172.90 attack
Apr  7 01:48:41 vmd26974 sshd[13605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.172.90
Apr  7 01:48:44 vmd26974 sshd[13605]: Failed password for invalid user sales from 206.189.172.90 port 36958 ssh2
...
2020-04-07 07:52:46
63.143.52.172 attack
spam
2020-04-07 07:46:37

Recently Reported IPs

109.42.177.208 185.125.252.158 185.125.251.190 165.107.111.148
116.254.100.225 148.72.210.64 153.156.28.34 152.117.252.244
211.13.205.78 113.35.124.177 209.171.85.232 133.186.50.79
63.99.64.83 166.147.166.16 224.98.35.43 104.28.243.226
149.34.244.242 82.106.60.173 194.146.14.177 66.63.35.66