Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vienna

Region: Vienna

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.131.80.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;128.131.80.34.			IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121701 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 18 04:23:50 CST 2019
;; MSG SIZE  rcvd: 117
Host info
34.80.131.128.in-addr.arpa domain name pointer extract.ict.tuwien.ac.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.80.131.128.in-addr.arpa	name = extract.ict.tuwien.ac.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.163.178.146 attackspambots
Jul 13 05:18:11 XXX sshd[5077]: Invalid user react from 118.163.178.146 port 55841
2019-07-13 14:55:04
211.210.13.201 attackspam
2019-07-13T05:39:58.628083abusebot-3.cloudsearch.cf sshd\[22509\]: Invalid user jenkins from 211.210.13.201 port 56222
2019-07-13 14:36:57
104.248.255.118 attack
Jul 13 06:57:32 sshgateway sshd\[20859\]: Invalid user karen from 104.248.255.118
Jul 13 06:57:32 sshgateway sshd\[20859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.255.118
Jul 13 06:57:34 sshgateway sshd\[20859\]: Failed password for invalid user karen from 104.248.255.118 port 54246 ssh2
2019-07-13 15:00:05
51.83.42.244 attackbots
Invalid user xg from 51.83.42.244 port 53598
2019-07-13 15:08:41
187.85.9.154 attack
Invalid user testtest from 187.85.9.154 port 47879
2019-07-13 14:42:49
202.152.151.66 attackspam
Invalid user guest from 202.152.151.66 port 55977
2019-07-13 15:17:43
155.230.28.249 attackspam
Invalid user ts from 155.230.28.249 port 53916
2019-07-13 14:50:39
13.71.2.244 attackbotsspam
Jul 13 07:56:58 dev sshd\[1836\]: Invalid user tim from 13.71.2.244 port 60576
Jul 13 07:56:58 dev sshd\[1836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.2.244
Jul 13 07:57:01 dev sshd\[1836\]: Failed password for invalid user tim from 13.71.2.244 port 60576 ssh2
2019-07-13 14:35:16
165.22.251.129 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-07-13 15:25:11
185.230.127.230 attackbots
Invalid user admin from 185.230.127.230 port 5262
2019-07-13 14:43:17
40.124.4.131 attack
$f2bV_matches
2019-07-13 15:12:32
79.2.138.202 attack
Jul 13 08:54:01 MK-Soft-Root1 sshd\[19134\]: Invalid user user from 79.2.138.202 port 65001
Jul 13 08:54:01 MK-Soft-Root1 sshd\[19134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.2.138.202
Jul 13 08:54:02 MK-Soft-Root1 sshd\[19134\]: Failed password for invalid user user from 79.2.138.202 port 65001 ssh2
...
2019-07-13 15:05:52
94.191.70.31 attack
Invalid user apache from 94.191.70.31 port 57574
2019-07-13 15:03:07
14.248.63.9 attackbots
Invalid user admin from 14.248.63.9 port 54392
2019-07-13 15:13:29
148.0.252.84 attackbotsspam
Jul 13 07:57:26 fr01 sshd[21185]: Invalid user pi from 148.0.252.84
Jul 13 07:57:26 fr01 sshd[21186]: Invalid user pi from 148.0.252.84
Jul 13 07:57:26 fr01 sshd[21185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.0.252.84
Jul 13 07:57:26 fr01 sshd[21185]: Invalid user pi from 148.0.252.84
Jul 13 07:57:28 fr01 sshd[21185]: Failed password for invalid user pi from 148.0.252.84 port 37506 ssh2
Jul 13 07:57:26 fr01 sshd[21186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.0.252.84
Jul 13 07:57:26 fr01 sshd[21186]: Invalid user pi from 148.0.252.84
Jul 13 07:57:28 fr01 sshd[21186]: Failed password for invalid user pi from 148.0.252.84 port 37508 ssh2
...
2019-07-13 15:27:36

Recently Reported IPs

200.215.16.7 197.65.177.68 220.167.56.93 93.114.239.112
35.170.243.227 200.172.202.167 32.142.141.87 151.84.222.16
97.121.255.226 202.187.16.109 190.60.211.42 217.1.83.219
46.195.242.241 45.86.34.74 13.83.223.0 36.63.227.148
176.189.114.183 91.179.8.103 220.10.168.97 213.78.76.90