Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vancouver

Region: British Columbia

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: Shaw Communications Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 24.80.116.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5250
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;24.80.116.132.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 14 00:30:35 CST 2019
;; MSG SIZE  rcvd: 117

Host info
132.116.80.24.in-addr.arpa domain name pointer S010664777d475603.vc.shawcable.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
132.116.80.24.in-addr.arpa	name = S010664777d475603.vc.shawcable.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
52.138.26.98 attackbotsspam
Aug 13 04:17:26 ws22vmsma01 sshd[80984]: Failed password for root from 52.138.26.98 port 36480 ssh2
...
2020-08-13 18:17:34
106.12.100.73 attackbotsspam
Aug 13 10:42:47 piServer sshd[29954]: Failed password for root from 106.12.100.73 port 57150 ssh2
Aug 13 10:46:40 piServer sshd[30446]: Failed password for root from 106.12.100.73 port 44864 ssh2
...
2020-08-13 18:09:11
222.186.30.112 attackbotsspam
Aug 13 13:15:19 server2 sshd\[29075\]: User root from 222.186.30.112 not allowed because not listed in AllowUsers
Aug 13 13:15:21 server2 sshd\[29079\]: User root from 222.186.30.112 not allowed because not listed in AllowUsers
Aug 13 13:15:27 server2 sshd\[29087\]: User root from 222.186.30.112 not allowed because not listed in AllowUsers
Aug 13 13:20:09 server2 sshd\[29474\]: User root from 222.186.30.112 not allowed because not listed in AllowUsers
Aug 13 13:22:48 server2 sshd\[29592\]: User root from 222.186.30.112 not allowed because not listed in AllowUsers
Aug 13 13:23:19 server2 sshd\[29630\]: User root from 222.186.30.112 not allowed because not listed in AllowUsers
2020-08-13 18:32:55
14.188.129.245 attack
1597290535 - 08/13/2020 05:48:55 Host: 14.188.129.245/14.188.129.245 Port: 445 TCP Blocked
2020-08-13 18:14:09
106.12.155.254 attackbots
Port Scan
...
2020-08-13 17:57:46
149.56.44.47 attack
Aug 13 05:49:08 ns382633 sshd\[25300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.47  user=root
Aug 13 05:49:11 ns382633 sshd\[25300\]: Failed password for root from 149.56.44.47 port 50212 ssh2
Aug 13 05:49:13 ns382633 sshd\[25300\]: Failed password for root from 149.56.44.47 port 50212 ssh2
Aug 13 05:49:16 ns382633 sshd\[25300\]: Failed password for root from 149.56.44.47 port 50212 ssh2
Aug 13 05:49:17 ns382633 sshd\[25300\]: Failed password for root from 149.56.44.47 port 50212 ssh2
2020-08-13 17:56:06
212.47.229.4 attack
Aug 13 10:45:44 roki sshd[26631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.229.4  user=root
Aug 13 10:45:46 roki sshd[26631]: Failed password for root from 212.47.229.4 port 57442 ssh2
Aug 13 10:45:48 roki sshd[26631]: Failed password for root from 212.47.229.4 port 57442 ssh2
Aug 13 10:45:50 roki sshd[26631]: Failed password for root from 212.47.229.4 port 57442 ssh2
Aug 13 10:45:51 roki sshd[26631]: Failed password for root from 212.47.229.4 port 57442 ssh2
...
2020-08-13 18:33:17
36.90.100.81 attack
1597290535 - 08/13/2020 05:48:55 Host: 36.90.100.81/36.90.100.81 Port: 445 TCP Blocked
2020-08-13 18:13:25
106.12.42.251 attackbotsspam
Port scan denied
2020-08-13 18:25:16
195.154.179.3 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-13 18:27:51
106.52.93.202 attackspam
Aug 13 10:17:11 dev0-dcde-rnet sshd[27845]: Failed password for root from 106.52.93.202 port 57546 ssh2
Aug 13 10:23:05 dev0-dcde-rnet sshd[27861]: Failed password for root from 106.52.93.202 port 36306 ssh2
2020-08-13 18:20:21
5.196.225.174 attackbotsspam
sshd: Failed password for .... from 5.196.225.174 port 60060 ssh2 (11 attempts)
2020-08-13 18:28:59
222.186.42.155 attackbotsspam
Aug 13 12:09:33 vmanager6029 sshd\[12195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Aug 13 12:09:35 vmanager6029 sshd\[12193\]: error: PAM: Authentication failure for root from 222.186.42.155
Aug 13 12:09:35 vmanager6029 sshd\[12196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
2020-08-13 18:22:00
202.70.136.161 attackspam
Aug 13 10:06:47 prox sshd[22455]: Failed password for root from 202.70.136.161 port 35048 ssh2
2020-08-13 18:02:11
91.229.112.11 attack
[H1.VM6] Blocked by UFW
2020-08-13 18:03:13

Recently Reported IPs

185.220.101.60 174.22.145.72 185.156.178.83 197.251.236.19
90.167.175.96 41.171.116.85 158.174.122.199 220.200.26.120
95.213.136.220 191.37.183.146 139.193.16.205 49.104.75.124
181.214.143.134 208.173.129.142 111.143.28.110 111.101.251.230
111.208.188.191 181.214.143.135 149.99.24.133 185.7.87.247