Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.80.20.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.80.20.141.			IN	A

;; AUTHORITY SECTION:
.			340	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 18:47:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
141.20.80.103.in-addr.arpa domain name pointer landequity.voice1.rodin.com.au.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.20.80.103.in-addr.arpa	name = landequity.voice1.rodin.com.au.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.204.233.214 attack
Jul  3 20:10:29 django-0 sshd[9336]: Invalid user ysl from 129.204.233.214
...
2020-07-04 04:08:08
222.240.223.85 attackbotsspam
2020-07-03T23:16:27.464774mail.standpoint.com.ua sshd[30539]: Failed password for invalid user ysh from 222.240.223.85 port 42296 ssh2
2020-07-03T23:19:57.959055mail.standpoint.com.ua sshd[31039]: Invalid user taiga from 222.240.223.85 port 60303
2020-07-03T23:19:57.961981mail.standpoint.com.ua sshd[31039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.240.223.85
2020-07-03T23:19:57.959055mail.standpoint.com.ua sshd[31039]: Invalid user taiga from 222.240.223.85 port 60303
2020-07-03T23:20:00.210611mail.standpoint.com.ua sshd[31039]: Failed password for invalid user taiga from 222.240.223.85 port 60303 ssh2
...
2020-07-04 04:23:43
61.177.172.159 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-04 04:11:42
138.204.24.31 attack
$f2bV_matches
2020-07-04 04:31:49
138.219.129.150 attackbotsspam
$f2bV_matches
2020-07-04 04:28:15
120.92.119.90 attackspambots
Jul  3 22:03:27 mout sshd[17026]: Invalid user msmith from 120.92.119.90 port 11356
2020-07-04 04:13:15
190.111.216.204 attackbotsspam
Jul  3 21:48:02 root sshd[17368]: Failed password for invalid user zhangjb from 190.111.216.204 port 55944 ssh2
...
2020-07-04 04:00:00
160.34.6.55 attackbots
Unauthorized connection attempt detected, IP banned.
2020-07-04 04:07:52
77.210.180.7 attack
Jul  3 17:03:22 ws22vmsma01 sshd[218407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.210.180.7
Jul  3 17:03:24 ws22vmsma01 sshd[218407]: Failed password for invalid user pratik from 77.210.180.7 port 59936 ssh2
...
2020-07-04 04:16:39
31.220.0.16 attack
Automatic report - Banned IP Access
2020-07-04 03:59:01
190.111.141.64 attack
Automatic report - Port Scan Attack
2020-07-04 04:28:49
101.32.3.166 attackbotsspam
Port scan on 2 port(s): 21 2121
2020-07-04 04:00:28
41.220.155.27 attack
Unauthorized connection attempt from IP address 41.220.155.27 on Port 445(SMB)
2020-07-04 03:58:31
113.119.164.9 attackspam
20 attempts against mh-ssh on grass
2020-07-04 04:35:46
138.204.24.32 attackbotsspam
$f2bV_matches
2020-07-04 04:29:14

Recently Reported IPs

103.80.20.151 103.80.20.146 103.80.20.158 101.108.40.216
103.80.20.164 103.80.20.168 103.80.20.173 103.80.20.162
103.80.20.175 103.80.20.176 103.80.20.160 103.80.20.186
103.80.20.181 103.80.20.179 103.80.210.10 103.80.210.110
101.108.40.22 103.80.236.106 103.80.219.144 112.106.175.55