Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.124.18.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31360
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.124.18.80.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 06:34:20 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 80.18.124.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.18.124.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.25.36.79 attackspam
"SSH brute force auth login attempt."
2020-01-23 16:53:10
106.53.88.247 attack
Unauthorized connection attempt detected from IP address 106.53.88.247 to port 2220 [J]
2020-01-23 17:26:05
116.77.49.89 attackbotsspam
"SSH brute force auth login attempt."
2020-01-23 17:28:48
123.24.125.22 attackbots
"SMTP brute force auth login attempt."
2020-01-23 16:55:17
118.24.173.104 attackbotsspam
Jan 23 10:08:07 MK-Soft-VM8 sshd[2220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104 
Jan 23 10:08:09 MK-Soft-VM8 sshd[2220]: Failed password for invalid user mongouser from 118.24.173.104 port 38881 ssh2
...
2020-01-23 17:27:31
37.139.1.197 attackbotsspam
$f2bV_matches
2020-01-23 17:08:41
112.220.85.26 attackspambots
"SSH brute force auth login attempt."
2020-01-23 17:05:57
114.67.68.30 attackbotsspam
"SSH brute force auth login attempt."
2020-01-23 17:30:46
185.176.27.42 attackbotsspam
01/23/2020-10:05:02.678704 185.176.27.42 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-23 17:28:24
106.124.137.103 attackbotsspam
"SSH brute force auth login attempt."
2020-01-23 17:15:46
144.34.253.93 attackspam
Jan 22 22:19:35 php1 sshd\[6174\]: Invalid user gs from 144.34.253.93
Jan 22 22:19:35 php1 sshd\[6174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.253.93.16clouds.com
Jan 22 22:19:38 php1 sshd\[6174\]: Failed password for invalid user gs from 144.34.253.93 port 50648 ssh2
Jan 22 22:23:20 php1 sshd\[6659\]: Invalid user library from 144.34.253.93
Jan 22 22:23:20 php1 sshd\[6659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.253.93.16clouds.com
2020-01-23 17:17:04
138.197.32.150 attack
"SSH brute force auth login attempt."
2020-01-23 17:08:09
60.250.31.107 attackspam
"SSH brute force auth login attempt."
2020-01-23 17:27:57
14.29.180.58 attackspambots
Unauthorized connection attempt detected from IP address 14.29.180.58 to port 2220 [J]
2020-01-23 17:18:21
188.165.40.174 attackspambots
Invalid user user from 188.165.40.174 port 36106
2020-01-23 17:25:13

Recently Reported IPs

114.64.236.131 194.158.72.208 206.191.149.6 36.74.42.78
31.217.212.53 5.130.57.24 154.192.166.29 89.221.223.93
46.176.53.31 42.232.233.58 58.224.51.214 90.150.21.34
124.114.72.133 204.116.43.129 50.233.111.162 180.242.99.3
93.76.176.158 182.56.236.36 180.211.141.218 185.9.184.72