Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Montreal

Region: Quebec

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: Cogent Communications

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.80.236.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39592
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;69.80.236.18.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052600 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun May 26 20:48:35 CST 2019
;; MSG SIZE  rcvd: 116

Host info
Host 18.236.80.69.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 18.236.80.69.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
104.143.83.242 attackspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-10-05 16:17:36
218.94.143.226 attackbotsspam
2019-10-05T05:44:54.589022abusebot-7.cloudsearch.cf sshd\[23751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.143.226  user=root
2019-10-05 16:35:10
121.227.131.220 attack
ssh failed login
2019-10-05 16:12:28
91.98.99.131 attack
Automatic report - XMLRPC Attack
2019-10-05 16:12:54
202.169.246.34 attackspam
postfix
2019-10-05 16:38:32
171.248.155.239 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-10-05 16:44:18
123.206.81.59 attack
$f2bV_matches
2019-10-05 16:18:01
106.12.77.199 attack
SSH brutforce
2019-10-05 16:05:16
79.137.72.40 attack
Oct  5 07:39:03 SilenceServices sshd[4229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.40
Oct  5 07:39:05 SilenceServices sshd[4229]: Failed password for invalid user Par0la321 from 79.137.72.40 port 48376 ssh2
Oct  5 07:42:51 SilenceServices sshd[5656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.40
2019-10-05 16:11:40
139.59.59.187 attackbotsspam
IP attempted unauthorised action
2019-10-05 16:15:33
27.50.168.25 attackspambots
firewall-block, port(s): 60001/tcp
2019-10-05 16:29:01
222.186.175.148 attack
$f2bV_matches
2019-10-05 16:34:21
118.24.55.171 attackbots
Failed password for root from 118.24.55.171 port 1836 ssh2
2019-10-05 16:36:29
185.234.216.140 attack
Oct  5 10:00:30 andromeda postfix/smtpd\[43552\]: warning: unknown\[185.234.216.140\]: SASL LOGIN authentication failed: authentication failure
Oct  5 10:00:30 andromeda postfix/smtpd\[43552\]: warning: unknown\[185.234.216.140\]: SASL LOGIN authentication failed: authentication failure
Oct  5 10:00:31 andromeda postfix/smtpd\[43552\]: warning: unknown\[185.234.216.140\]: SASL LOGIN authentication failed: authentication failure
Oct  5 10:00:31 andromeda postfix/smtpd\[43552\]: warning: unknown\[185.234.216.140\]: SASL LOGIN authentication failed: authentication failure
Oct  5 10:00:31 andromeda postfix/smtpd\[43552\]: warning: unknown\[185.234.216.140\]: SASL LOGIN authentication failed: authentication failure
2019-10-05 16:17:13
210.157.255.252 attackbotsspam
Oct  5 07:47:58 dedicated sshd[11192]: Invalid user 123Jack from 210.157.255.252 port 47774
2019-10-05 16:41:22

Recently Reported IPs

38.145.50.59 162.169.235.24 94.152.193.77 66.137.125.26
37.3.166.147 94.152.193.72 219.216.38.27 53.16.82.58
94.152.193.71 23.4.69.95 62.234.93.251 126.198.33.21
187.103.226.15 79.144.45.8 221.239.208.125 94.152.193.51
92.236.151.121 223.239.152.68 187.102.96.72 1.239.33.146