Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.80.132.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.80.132.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 03:51:27 CST 2025
;; MSG SIZE  rcvd: 104
Host info
81.132.80.2.in-addr.arpa domain name pointer bl19-132-81.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
81.132.80.2.in-addr.arpa	name = bl19-132-81.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.89.115.224 attackbotsspam
Invalid user jch from 118.89.115.224 port 38126
2020-08-02 13:57:36
188.165.210.176 attackspam
Aug  2 05:50:48 santamaria sshd\[16977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.210.176  user=root
Aug  2 05:50:50 santamaria sshd\[16977\]: Failed password for root from 188.165.210.176 port 60348 ssh2
Aug  2 05:54:48 santamaria sshd\[17063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.210.176  user=root
...
2020-08-02 13:14:15
118.123.15.236 attack
Icarus honeypot on github
2020-08-02 13:15:45
194.8.85.160 attackspambots
20/8/1@23:54:59: FAIL: Alarm-Network address from=194.8.85.160
...
2020-08-02 13:05:51
14.161.45.187 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-02 13:25:02
180.76.105.81 attackbots
Aug  2 00:56:22 NPSTNNYC01T sshd[20533]: Failed password for root from 180.76.105.81 port 48378 ssh2
Aug  2 00:59:22 NPSTNNYC01T sshd[20765]: Failed password for root from 180.76.105.81 port 54728 ssh2
...
2020-08-02 13:19:38
78.128.113.115 attackbotsspam
2020-08-01T23:22:17.930040linuxbox-skyline auth[29934]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=postmaster rhost=78.128.113.115
...
2020-08-02 13:22:26
118.68.217.47 attack
Automatic report - Port Scan Attack
2020-08-02 13:07:38
50.100.113.207 attackspambots
Aug  1 19:36:05 web9 sshd\[29646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.100.113.207  user=root
Aug  1 19:36:07 web9 sshd\[29646\]: Failed password for root from 50.100.113.207 port 60494 ssh2
Aug  1 19:39:38 web9 sshd\[30137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.100.113.207  user=root
Aug  1 19:39:41 web9 sshd\[30137\]: Failed password for root from 50.100.113.207 port 34826 ssh2
Aug  1 19:43:05 web9 sshd\[30598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.100.113.207  user=root
2020-08-02 13:59:21
23.83.89.8 attackspambots
Automatic report - Banned IP Access
2020-08-02 13:52:36
88.132.66.26 attack
Aug  1 21:53:51 Host-KLAX-C sshd[15298]: User root from 88.132.66.26 not allowed because not listed in AllowUsers
...
2020-08-02 13:52:08
66.70.130.152 attack
Invalid user play from 66.70.130.152 port 56548
2020-08-02 13:27:19
123.206.220.246 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-02 13:23:13
195.54.160.183 attackbotsspam
2020-08-02T07:15:10.767813ns386461 sshd\[15008\]: Invalid user ftpuser from 195.54.160.183 port 53179
2020-08-02T07:15:10.818330ns386461 sshd\[15008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.183
2020-08-02T07:15:12.861440ns386461 sshd\[15008\]: Failed password for invalid user ftpuser from 195.54.160.183 port 53179 ssh2
2020-08-02T07:15:13.335029ns386461 sshd\[15013\]: Invalid user guest from 195.54.160.183 port 59459
2020-08-02T07:15:13.384820ns386461 sshd\[15013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.183
...
2020-08-02 13:16:37
119.115.128.2 attackspambots
Port Scan/VNC login attempt
...
2020-08-02 13:43:28

Recently Reported IPs

151.92.11.97 124.91.126.170 126.151.247.205 180.112.76.142
216.76.207.177 24.30.139.91 28.19.144.155 9.186.156.186
128.150.226.52 236.98.211.250 197.143.47.148 156.166.223.101
103.30.58.235 198.108.151.223 7.79.216.180 132.60.9.164
197.185.221.220 129.68.234.2 7.13.209.165 64.10.97.69