Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.80.9.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47337
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;180.80.9.107.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 23:52:10 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 107.9.80.180.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.9.80.180.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
154.126.36.108 attackspambots
SMB Server BruteForce Attack
2020-10-05 22:44:13
122.51.150.134 attackspam
Oct  5 10:29:31 nopemail auth.info sshd[17307]: Disconnected from authenticating user root 122.51.150.134 port 39652 [preauth]
...
2020-10-05 22:29:14
220.86.37.149 attackspambots
 TCP (SYN) 220.86.37.149:38433 -> port 23, len 40
2020-10-05 22:39:42
49.70.40.131 attackbots
52869/tcp 52869/tcp
[2020-10-04]2pkt
2020-10-05 22:50:56
178.164.190.69 attackspam
5555/tcp
[2020-10-04]1pkt
2020-10-05 22:40:42
116.88.138.81 attackbots
Port probing on unauthorized port 23
2020-10-05 22:54:20
182.112.50.135 attack
SSH login attempts.
2020-10-05 22:36:40
175.215.108.203 attack
Found on   CINS badguys     / proto=6  .  srcport=14499  .  dstport=23 Telnet  .     (2056)
2020-10-05 22:31:24
194.180.224.115 attackbotsspam
Oct  5 16:33:34 host sshd[10210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.115  user=root
Oct  5 16:33:35 host sshd[10210]: Failed password for root from 194.180.224.115 port 41684 ssh2
...
2020-10-05 22:37:49
217.153.157.227 attackspam
8728/tcp
[2020-10-04]1pkt
2020-10-05 22:33:11
122.194.229.37 attackspambots
prod8
...
2020-10-05 22:38:31
91.215.70.198 attackbots
445/tcp
[2020-10-04]1pkt
2020-10-05 23:00:21
171.231.17.136 attackbots
445/tcp
[2020-10-04]1pkt
2020-10-05 22:33:26
201.243.194.180 attackspambots
SMB Server BruteForce Attack
2020-10-05 22:35:33
201.159.114.203 attackspam
Icarus honeypot on github
2020-10-05 22:37:23

Recently Reported IPs

47.106.118.239 145.11.170.137 60.158.233.197 238.170.233.9
179.61.155.176 200.208.180.80 85.17.36.147 170.19.195.108
17.42.127.241 95.124.203.208 96.254.34.213 198.138.13.50
35.131.195.228 239.237.231.102 228.87.182.203 53.22.255.74
145.201.203.202 208.123.39.51 72.79.36.99 197.209.177.224