Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.80.131.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20884
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.80.131.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 03:44:56 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 42.131.80.18.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.131.80.18.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.77.179.142 attackspam
Unauthorized connection attempt detected from IP address 27.77.179.142 to port 81
2020-07-27 18:06:14
104.131.91.148 attack
Jul 27 10:03:52 localhost sshd[48630]: Invalid user pi from 104.131.91.148 port 53920
Jul 27 10:03:52 localhost sshd[48630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.91.148
Jul 27 10:03:52 localhost sshd[48630]: Invalid user pi from 104.131.91.148 port 53920
Jul 27 10:03:55 localhost sshd[48630]: Failed password for invalid user pi from 104.131.91.148 port 53920 ssh2
Jul 27 10:09:34 localhost sshd[49284]: Invalid user stu1 from 104.131.91.148 port 60413
...
2020-07-27 18:23:47
175.24.50.61 attackbotsspam
Invalid user user from 175.24.50.61 port 52244
2020-07-27 18:02:40
36.37.180.78 attackbots
firewall-block, port(s): 445/tcp
2020-07-27 18:05:32
185.189.123.34 attackbots
Unauthorized connection attempt detected from IP address 185.189.123.34 to port 445
2020-07-27 18:00:10
45.7.138.40 attackspambots
SIP/5060 Probe, BF, Hack -
2020-07-27 18:04:28
129.211.124.120 attackbotsspam
Invalid user gpn from 129.211.124.120 port 33284
2020-07-27 18:16:34
178.165.56.235 attack
Automatic report - Banned IP Access
2020-07-27 18:14:15
42.191.31.154 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-27 18:08:18
192.99.135.113 attackspambots
2020-07-27T20:16:08.815622luisaranguren sshd[1393049]: Invalid user alikhan from 192.99.135.113 port 53038
2020-07-27T20:16:11.754279luisaranguren sshd[1393049]: Failed password for invalid user alikhan from 192.99.135.113 port 53038 ssh2
...
2020-07-27 18:30:55
209.126.122.108 attackspambots
Jul 27 05:41:52 carla sshd[24725]: Did not receive identification string from 209.126.122.108
Jul 27 05:42:00 carla sshd[24728]: Failed password for invalid user bin from 209.126.122.108 port 45097 ssh2
Jul 27 05:42:01 carla sshd[24729]: Received disconnect from 209.126.122.108: 11: Normal Shutdown, Thank you for playing
Jul 27 05:42:01 carla sshd[24726]: Failed password for invalid user daemon from 209.126.122.108 port 41568 ssh2
Jul 27 05:42:01 carla sshd[24727]: Received disconnect from 209.126.122.108: 11: Normal Shutdown, Thank you for playing
Jul 27 05:42:02 carla sshd[24732]: Invalid user localhost from 209.126.122.108
Jul 27 05:42:02 carla sshd[24730]: Invalid user VM from 209.126.122.108


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=209.126.122.108
2020-07-27 18:16:47
158.69.194.115 attackspam
Jul 27 12:06:38 eventyay sshd[31836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.194.115
Jul 27 12:06:39 eventyay sshd[31836]: Failed password for invalid user uli from 158.69.194.115 port 42350 ssh2
Jul 27 12:14:09 eventyay sshd[32102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.194.115
...
2020-07-27 18:19:14
190.152.215.77 attack
Invalid user tomcat from 190.152.215.77 port 55940
2020-07-27 18:10:05
181.40.122.2 attack
2020-07-27T11:17:58.158968n23.at sshd[768451]: Invalid user maestro from 181.40.122.2 port 51689
2020-07-27T11:17:59.850228n23.at sshd[768451]: Failed password for invalid user maestro from 181.40.122.2 port 51689 ssh2
2020-07-27T11:28:19.489216n23.at sshd[777422]: Invalid user dev from 181.40.122.2 port 62991
...
2020-07-27 18:31:59
92.119.97.137 attackspam
 TCP (SYN) 92.119.97.137:5737 -> port 23, len 44
2020-07-27 18:05:15

Recently Reported IPs

146.171.110.127 13.199.155.119 207.114.152.10 229.70.28.159
67.247.173.45 48.46.85.60 14.69.28.213 174.174.103.182
40.154.241.66 22.54.106.70 130.136.223.134 128.248.106.31
241.71.85.129 109.198.203.27 62.250.225.57 207.76.10.5
7.214.197.15 36.18.1.146 12.193.174.217 212.150.234.233