Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.63.70.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21622
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.63.70.80.			IN	A

;; AUTHORITY SECTION:
.			255	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063000 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 30 17:53:13 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 80.70.63.18.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.70.63.18.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.255.140.60 attack
Port probing on unauthorized port 81
2020-07-17 15:34:42
89.248.160.178 attack
[Tue Jun 02 17:37:07 2020] - DDoS Attack From IP: 89.248.160.178 Port: 42779
2020-07-17 15:34:12
45.145.66.108 attackbots
Jul 17 08:40:39 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=45.145.66.108 DST=79.143.186.54 LEN=40 TOS=0x00 PREC=0x20 TTL=248 ID=59382 PROTO=TCP SPT=49987 DPT=17008 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 17 08:44:29 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=45.145.66.108 DST=79.143.186.54 LEN=40 TOS=0x00 PREC=0x20 TTL=248 ID=39872 PROTO=TCP SPT=49987 DPT=17010 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 17 08:53:03 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=45.145.66.108 DST=79.143.186.54 LEN=40 TOS=0x00 PREC=0x20 TTL=248 ID=10935 PROTO=TCP SPT=49987 DPT=27006 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-17 15:36:48
195.24.129.234 attack
Jul 17 08:36:26 ajax sshd[30183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.129.234 
Jul 17 08:36:28 ajax sshd[30183]: Failed password for invalid user midas from 195.24.129.234 port 54868 ssh2
2020-07-17 15:44:10
223.85.174.11 attack
Jul 17 05:55:12 sxvn sshd[107206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.85.174.11
2020-07-17 15:40:25
77.53.69.133 attackbotsspam
Unauthorized connection attempt detected from IP address 77.53.69.133 to port 23
2020-07-17 15:12:37
206.189.210.235 attackspambots
Jul 16 21:26:37 php1 sshd\[5983\]: Invalid user bonnie from 206.189.210.235
Jul 16 21:26:37 php1 sshd\[5983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.210.235
Jul 16 21:26:39 php1 sshd\[5983\]: Failed password for invalid user bonnie from 206.189.210.235 port 21718 ssh2
Jul 16 21:28:16 php1 sshd\[6109\]: Invalid user cristovao from 206.189.210.235
Jul 16 21:28:16 php1 sshd\[6109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.210.235
2020-07-17 15:35:05
45.80.65.82 attackspam
(sshd) Failed SSH login from 45.80.65.82 (RU/Russia/-): 5 in the last 3600 secs
2020-07-17 15:43:41
185.86.164.111 attackbots
lee-Joomla Admin : try to force the door...
2020-07-17 15:29:34
106.12.159.174 attack
Spam detected 2020.07.17 05:55:47
blocked until 2020.09.04 22:57:47
2020-07-17 15:09:22
45.125.65.52 attackbotsspam
2020-07-17T09:22:53.353492www postfix/smtpd[30004]: warning: unknown[45.125.65.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-17T09:25:30.113599www postfix/smtpd[30004]: warning: unknown[45.125.65.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-17T09:30:43.227135www postfix/smtpd[30274]: warning: unknown[45.125.65.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-17 15:30:50
80.82.77.67 attack
firewall-block, port(s): 15008/tcp, 15019/tcp, 15027/tcp, 15046/tcp, 15061/tcp, 15079/tcp, 15131/tcp, 15141/tcp, 15148/tcp, 15179/tcp, 15197/tcp, 15220/tcp, 15239/tcp, 15285/tcp, 15305/tcp, 15320/tcp, 15329/tcp, 15356/tcp, 15372/tcp, 15399/tcp, 15409/tcp, 15434/tcp, 15455/tcp, 15506/tcp, 15513/tcp, 15523/tcp, 15626/tcp, 15633/tcp, 15695/tcp, 15718/tcp, 15727/tcp, 15756/tcp, 15783/tcp, 15785/tcp, 15813/tcp, 15826/tcp, 15876/tcp, 15904/tcp, 15910/tcp, 15913/tcp, 15948/tcp, 15949/tcp, 15996/tcp
2020-07-17 15:12:05
193.70.0.42 attack
Invalid user aap from 193.70.0.42 port 41210
2020-07-17 15:16:51
179.57.254.69 attackbotsspam
20/7/16@23:55:36: FAIL: Alarm-Network address from=179.57.254.69
...
2020-07-17 15:16:11
179.125.32.80 attackspam
20/7/16@23:55:33: FAIL: Alarm-Network address from=179.125.32.80
20/7/16@23:55:34: FAIL: Alarm-Network address from=179.125.32.80
...
2020-07-17 15:17:21

Recently Reported IPs

193.43.134.46 60.253.51.27 101.188.62.81 14.33.155.208
137.226.233.164 85.70.143.104 169.229.200.84 169.229.178.51
40.5.105.62 30.2.47.183 121.128.210.167 12.58.10.70
139.63.5.89 4.88.255.83 188.222.192.18 88.29.116.38
34.102.147.96 71.66.204.2 116.73.178.194 248.26.78.9