Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 188.80.158.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41237
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;188.80.158.18.			IN	A

;; AUTHORITY SECTION:
.			166	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 04 02:01:47 CST 2022
;; MSG SIZE  rcvd: 106
Host info
18.158.80.188.in-addr.arpa domain name pointer bl15-158-18.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.158.80.188.in-addr.arpa	name = bl15-158-18.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.39.49.42 attack
*Port Scan* detected from 54.39.49.42 (CA/Canada/Quebec/Montreal (Ville-Marie)/ns554303.ip-54-39-49.net). 4 hits in the last 140 seconds
2020-08-26 12:21:37
85.234.145.20 attack
*Port Scan* detected from 85.234.145.20 (GB/United Kingdom/England/Reading/85-234-145-20.static.as29550.net). 4 hits in the last 250 seconds
2020-08-26 12:16:26
222.98.173.216 attack
Aug 25 20:55:03 mockhub sshd[26131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.98.173.216
Aug 25 20:55:05 mockhub sshd[26131]: Failed password for invalid user szy from 222.98.173.216 port 35600 ssh2
...
2020-08-26 12:37:37
81.3.6.164 attackspambots
*Port Scan* detected from 81.3.6.164 (DE/Germany/Lower Saxony/Hanover (Linden-Limmer)/w3.tutanota.de). 4 hits in the last 256 seconds
2020-08-26 12:19:41
117.67.76.239 attackbots
Aug 26 04:52:58 shivevps sshd[4335]: Bad protocol version identification '\024' from 117.67.76.239 port 15868
Aug 26 04:54:46 shivevps sshd[8012]: Bad protocol version identification '\024' from 117.67.76.239 port 48406
Aug 26 04:54:52 shivevps sshd[8406]: Bad protocol version identification '\024' from 117.67.76.239 port 29750
...
2020-08-26 12:03:32
117.94.140.170 attackbotsspam
Aug 26 04:54:46 shivevps sshd[7948]: Bad protocol version identification '\024' from 117.94.140.170 port 36024
Aug 26 04:54:46 shivevps sshd[7907]: Bad protocol version identification '\024' from 117.94.140.170 port 36014
Aug 26 04:54:47 shivevps sshd[8106]: Bad protocol version identification '\024' from 117.94.140.170 port 36060
...
2020-08-26 12:33:34
51.15.111.79 attack
Aug 26 04:52:54 shivevps sshd[3926]: Bad protocol version identification '\024' from 51.15.111.79 port 38900
Aug 26 04:54:45 shivevps sshd[7919]: Bad protocol version identification '\024' from 51.15.111.79 port 57566
Aug 26 04:54:48 shivevps sshd[8157]: Bad protocol version identification '\024' from 51.15.111.79 port 59462
...
2020-08-26 12:29:39
58.27.95.2 attackbots
Aug 26 00:51:31 firewall sshd[6801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.27.95.2  user=root
Aug 26 00:51:33 firewall sshd[6801]: Failed password for root from 58.27.95.2 port 46404 ssh2
Aug 26 00:55:06 firewall sshd[6894]: Invalid user ibmuser from 58.27.95.2
...
2020-08-26 12:34:13
123.149.141.182 attackbots
Aug 26 04:54:45 shivevps sshd[7875]: Bad protocol version identification '\024' from 123.149.141.182 port 44704
Aug 26 04:54:46 shivevps sshd[8015]: Bad protocol version identification '\024' from 123.149.141.182 port 44710
Aug 26 04:54:47 shivevps sshd[8061]: Bad protocol version identification '\024' from 123.149.141.182 port 44714
...
2020-08-26 12:39:23
116.12.251.132 attack
*Port Scan* detected from 116.12.251.132 (SG/Singapore/-/Singapore/-). 4 hits in the last 240 seconds
2020-08-26 12:43:34
181.209.107.106 attackspam
Aug 26 04:53:10 shivevps sshd[5126]: Bad protocol version identification '\024' from 181.209.107.106 port 46764
Aug 26 04:54:46 shivevps sshd[8014]: Bad protocol version identification '\024' from 181.209.107.106 port 49053
Aug 26 04:54:48 shivevps sshd[8184]: Bad protocol version identification '\024' from 181.209.107.106 port 49120
...
2020-08-26 12:24:42
81.17.131.59 attack
Aug 26 04:41:56 shivevps sshd[26060]: Bad protocol version identification '\024' from 81.17.131.59 port 58446
Aug 26 04:44:51 shivevps sshd[31865]: Bad protocol version identification '\024' from 81.17.131.59 port 35886
Aug 26 04:54:48 shivevps sshd[8127]: Bad protocol version identification '\024' from 81.17.131.59 port 60828
...
2020-08-26 12:30:48
181.48.46.195 attack
Aug 25 18:21:29 hanapaa sshd\[12244\]: Invalid user and from 181.48.46.195
Aug 25 18:21:29 hanapaa sshd\[12244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.46.195
Aug 25 18:21:31 hanapaa sshd\[12244\]: Failed password for invalid user and from 181.48.46.195 port 42985 ssh2
Aug 25 18:25:41 hanapaa sshd\[12576\]: Invalid user alexander from 181.48.46.195
Aug 25 18:25:41 hanapaa sshd\[12576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.46.195
2020-08-26 12:28:12
5.160.151.126 attackbots
IP 5.160.151.126 attacked honeypot on port: 8080 at 8/25/2020 8:55:13 PM
2020-08-26 12:21:02
159.65.136.141 attackspam
*Port Scan* detected from 159.65.136.141 (SG/Singapore/-/Singapore (Pioneer)/-). 4 hits in the last 35 seconds
2020-08-26 12:35:52

Recently Reported IPs

106.86.20.99 253.211.136.250 37.146.225.113 7.221.149.206
238.124.199.188 53.47.91.205 154.47.13.33 209.124.85.86
221.93.255.190 117.173.12.5 31.50.89.253 16.126.70.3
179.133.160.38 230.229.158.118 235.97.73.17 228.253.80.139
245.93.247.46 119.199.10.197 23.29.191.96 67.126.151.211