Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Quebec

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.44.232.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.44.232.80.			IN	A

;; AUTHORITY SECTION:
.			310	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023101602 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 17 11:04:18 CST 2023
;; MSG SIZE  rcvd: 106
Host info
80.232.44.142.in-addr.arpa domain name pointer ip80.ip-142-44-232.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.232.44.142.in-addr.arpa	name = ip80.ip-142-44-232.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
115.75.226.30 attack
Automatic report - Port Scan Attack
2020-02-10 19:21:18
73.74.35.113 attack
Honeypot attack, port: 81, PTR: c-73-74-35-113.hsd1.il.comcast.net.
2020-02-10 19:39:25
218.92.0.173 attackspam
Feb 10 12:10:03 plex sshd[18093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
Feb 10 12:10:06 plex sshd[18093]: Failed password for root from 218.92.0.173 port 15094 ssh2
2020-02-10 19:22:53
164.132.49.98 attack
no
2020-02-10 19:33:19
51.68.90.47 attackspambots
Feb 10 11:16:47 MK-Soft-VM5 sshd[944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.90.47 
Feb 10 11:16:49 MK-Soft-VM5 sshd[944]: Failed password for invalid user vqn from 51.68.90.47 port 60264 ssh2
...
2020-02-10 19:38:00
223.14.97.24 attack
unauthorized connection attempt
2020-02-10 19:25:54
36.232.127.227 attackspambots
unauthorized connection attempt
2020-02-10 19:24:36
14.29.162.139 attackspam
2020-02-10T02:52:00.4438951495-001 sshd[17367]: Invalid user tfc from 14.29.162.139 port 59047
2020-02-10T02:52:00.4472261495-001 sshd[17367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139
2020-02-10T02:52:00.4438951495-001 sshd[17367]: Invalid user tfc from 14.29.162.139 port 59047
2020-02-10T02:52:02.5404251495-001 sshd[17367]: Failed password for invalid user tfc from 14.29.162.139 port 59047 ssh2
2020-02-10T02:54:21.9953991495-001 sshd[17453]: Invalid user zty from 14.29.162.139 port 17704
2020-02-10T02:54:21.9991261495-001 sshd[17453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139
2020-02-10T02:54:21.9953991495-001 sshd[17453]: Invalid user zty from 14.29.162.139 port 17704
2020-02-10T02:54:24.1171191495-001 sshd[17453]: Failed password for invalid user zty from 14.29.162.139 port 17704 ssh2
2020-02-10T02:56:53.6205001495-001 sshd[17578]: Invalid user uqc from 14.29.162.
...
2020-02-10 19:14:21
185.36.81.23 attackspambots
Rude login attack (12 tries in 1d)
2020-02-10 19:09:28
49.85.70.8 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-02-10 19:05:11
200.194.30.21 attack
Automatic report - Port Scan Attack
2020-02-10 19:34:25
177.126.129.20 attack
port scan and connect, tcp 23 (telnet)
2020-02-10 19:33:01
103.45.101.245 attack
Invalid user knt from 103.45.101.245 port 60046
2020-02-10 19:19:17
115.79.41.168 attack
Honeypot attack, port: 445, PTR: adsl.viettel.vn.
2020-02-10 19:37:37
177.42.244.158 attackbotsspam
20/2/9@23:50:15: FAIL: Alarm-Network address from=177.42.244.158
...
2020-02-10 19:37:05

Recently Reported IPs

234.48.4.23 148.75.11.84 180.109.36.176 116.161.215.56
76.64.217.145 63.227.180.112 167.82.144.220 9.5.101.124
152.74.238.246 75.159.63.149 84.148.150.11 80.54.117.200
253.38.136.68 165.71.251.138 137.0.142.255 86.186.37.21
164.153.213.1 195.113.2.232 75.221.9.104 95.25.48.194