Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.80.50.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.80.50.131.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 19:44:31 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 131.50.80.128.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.50.80.128.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.203.82.104 attackspambots
leo_www
2019-12-14 04:08:34
212.62.61.13 attackspam
TCP Port Scanning
2019-12-14 04:23:48
183.82.121.34 attackspambots
Dec 13 19:08:36 icinga sshd[13711]: Failed password for root from 183.82.121.34 port 57555 ssh2
...
2019-12-14 04:10:21
54.219.186.4 attackbotsspam
54.219.186.4 - - [13/Dec/2019:17:12:41 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.219.186.4 - - [13/Dec/2019:17:12:42 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-14 04:01:45
202.146.235.79 attackspambots
Dec 13 15:09:58 ny01 sshd[23205]: Failed password for sshd from 202.146.235.79 port 46482 ssh2
Dec 13 15:17:11 ny01 sshd[23953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.146.235.79
Dec 13 15:17:13 ny01 sshd[23953]: Failed password for invalid user home from 202.146.235.79 port 54694 ssh2
2019-12-14 04:29:07
49.88.112.67 attack
Dec 13 22:11:58 sauna sshd[42346]: Failed password for root from 49.88.112.67 port 19042 ssh2
...
2019-12-14 04:16:10
51.75.153.255 attack
Dec 13 17:01:16 firewall sshd[728]: Failed password for invalid user emilie from 51.75.153.255 port 45568 ssh2
Dec 13 17:09:49 firewall sshd[878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.153.255  user=root
Dec 13 17:09:50 firewall sshd[878]: Failed password for root from 51.75.153.255 port 53548 ssh2
...
2019-12-14 04:15:12
41.78.83.32 attack
Dec 13 06:11:00 auw2 sshd\[22922\]: Invalid user kanungo from 41.78.83.32
Dec 13 06:11:00 auw2 sshd\[22922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.78.83.32
Dec 13 06:11:03 auw2 sshd\[22922\]: Failed password for invalid user kanungo from 41.78.83.32 port 36118 ssh2
Dec 13 06:18:09 auw2 sshd\[23643\]: Invalid user guest from 41.78.83.32
Dec 13 06:18:09 auw2 sshd\[23643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.78.83.32
2019-12-14 04:12:13
185.209.0.51 attack
12/13/2019-20:49:54.985063 185.209.0.51 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-14 03:59:01
5.178.87.219 attack
SSH brutforce
2019-12-14 04:27:51
159.65.159.81 attack
$f2bV_matches
2019-12-14 03:58:11
138.0.230.49 attack
(imapd) Failed IMAP login from 138.0.230.49 (HN/Honduras/-): 1 in the last 3600 secs
2019-12-14 03:54:36
118.24.89.243 attack
k+ssh-bruteforce
2019-12-14 04:11:27
221.143.48.143 attack
--- report ---
Dec 13 15:13:21 sshd: Connection from 221.143.48.143 port 37936
Dec 13 15:13:22 sshd: Address 221.143.48.143 maps to mailfwd.mailplug.co.kr, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Dec 13 15:13:22 sshd: Invalid user nancarrow from 221.143.48.143
Dec 13 15:13:23 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.143.48.143
Dec 13 15:13:25 sshd: Failed password for invalid user nancarrow from 221.143.48.143 port 37936 ssh2
Dec 13 15:13:25 sshd: Received disconnect from 221.143.48.143: 11: Bye Bye [preauth]
2019-12-14 03:58:38
169.197.108.197 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-14 04:25:49

Recently Reported IPs

213.135.19.221 202.98.25.198 228.22.61.10 198.225.84.153
27.207.83.10 202.202.26.145 33.55.215.188 240.210.39.227
132.151.33.55 118.201.14.140 128.196.36.36 209.157.29.85
148.124.78.114 119.215.88.57 194.61.240.1 249.88.71.218
123.108.73.143 245.195.8.150 198.196.124.112 72.244.98.47