Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.80.42.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46275
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.80.42.24.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122900 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 29 21:05:08 CST 2021
;; MSG SIZE  rcvd: 104
Host info
Host 24.42.80.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 24.42.80.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
146.88.240.4 attackspambots
03/29/2020-10:15:28.652607 146.88.240.4 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-03-29 22:23:50
92.190.153.246 attackspam
5x Failed Password
2020-03-29 23:02:58
185.17.229.97 attack
Mar 29 19:18:15 gw1 sshd[18446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.17.229.97
Mar 29 19:18:17 gw1 sshd[18446]: Failed password for invalid user uek from 185.17.229.97 port 56546 ssh2
...
2020-03-29 23:01:34
51.38.71.36 attackbotsspam
[ssh] SSH attack
2020-03-29 22:33:27
183.47.14.74 attackbots
2020-03-29T14:49:47.088986vps751288.ovh.net sshd\[18250\]: Invalid user cs from 183.47.14.74 port 60404
2020-03-29T14:49:47.100576vps751288.ovh.net sshd\[18250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.47.14.74
2020-03-29T14:49:49.019184vps751288.ovh.net sshd\[18250\]: Failed password for invalid user cs from 183.47.14.74 port 60404 ssh2
2020-03-29T14:52:43.092069vps751288.ovh.net sshd\[18252\]: Invalid user cshu from 183.47.14.74 port 46647
2020-03-29T14:52:43.101640vps751288.ovh.net sshd\[18252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.47.14.74
2020-03-29 23:13:08
178.62.220.70 attackspam
Mar 29 15:18:35 ms-srv sshd[24704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.220.70
Mar 29 15:18:38 ms-srv sshd[24704]: Failed password for invalid user test from 178.62.220.70 port 60698 ssh2
2020-03-29 22:49:52
118.25.12.59 attackbots
Mar 29 14:49:42 Ubuntu-1404-trusty-64-minimal sshd\[26120\]: Invalid user rsz from 118.25.12.59
Mar 29 14:49:42 Ubuntu-1404-trusty-64-minimal sshd\[26120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.12.59
Mar 29 14:49:44 Ubuntu-1404-trusty-64-minimal sshd\[26120\]: Failed password for invalid user rsz from 118.25.12.59 port 39048 ssh2
Mar 29 14:54:42 Ubuntu-1404-trusty-64-minimal sshd\[29255\]: Invalid user admin from 118.25.12.59
Mar 29 14:54:42 Ubuntu-1404-trusty-64-minimal sshd\[29255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.12.59
2020-03-29 22:46:44
23.67.133.225 attack
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-03-29 22:49:26
198.211.110.133 attackspambots
Mar 29 16:13:39 localhost sshd[21531]: Invalid user zrg from 198.211.110.133 port 46162
...
2020-03-29 22:51:49
211.72.117.101 attack
Mar 29 15:38:10 host01 sshd[15141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.72.117.101 
Mar 29 15:38:12 host01 sshd[15141]: Failed password for invalid user kzo from 211.72.117.101 port 38270 ssh2
Mar 29 15:42:20 host01 sshd[15886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.72.117.101 
...
2020-03-29 23:12:20
93.47.195.161 attackspam
Automatic report - Port Scan Attack
2020-03-29 22:56:27
90.188.117.237 attack
Mar 29 14:46:44 markkoudstaal sshd[6270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.188.117.237
Mar 29 14:46:46 markkoudstaal sshd[6270]: Failed password for invalid user admin from 90.188.117.237 port 50806 ssh2
Mar 29 14:46:49 markkoudstaal sshd[6290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.188.117.237
2020-03-29 23:16:42
31.220.51.151 attack
Mar 29 17:13:57 odroid64 sshd\[9147\]: User mysql from 31.220.51.151 not allowed because not listed in AllowUsers
Mar 29 17:13:57 odroid64 sshd\[9147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.51.151  user=mysql
...
2020-03-29 23:19:37
167.172.27.232 attackbots
Unauthorized connection attempt detected from IP address 167.172.27.232 to port 23 [T]
2020-03-29 22:23:12
162.243.232.174 attack
Invalid user nyx from 162.243.232.174 port 37414
2020-03-29 22:31:12

Recently Reported IPs

198.86.77.143 243.28.63.38 223.131.187.240 141.57.71.56
211.57.14.254 204.61.79.169 143.92.77.93 132.130.142.133
252.241.59.205 199.214.95.52 202.94.223.73 164.41.234.201
52.54.210.55 242.81.140.207 63.132.200.157 200.14.184.152
199.255.5.78 134.96.98.135 146.20.96.228 75.79.117.181