Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.103.97.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.103.97.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 17:08:21 CST 2025
;; MSG SIZE  rcvd: 105
Host info
42.97.103.80.in-addr.arpa domain name pointer 42.pool80-103-97.dynamic.orange.es.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.97.103.80.in-addr.arpa	name = 42.pool80-103-97.dynamic.orange.es.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.1.100 attackbots
Automatic report - Banned IP Access
2019-11-25 18:38:40
77.247.109.41 attack
SIPVicious Scanner Detection
2019-11-25 18:26:20
118.36.108.202 attackspambots
2019-11-25T08:55:45.637366shield sshd\[16960\]: Invalid user pi from 118.36.108.202 port 51622
2019-11-25T08:55:45.675252shield sshd\[16962\]: Invalid user pi from 118.36.108.202 port 51624
2019-11-25T08:55:45.848060shield sshd\[16960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.36.108.202
2019-11-25T08:55:45.886705shield sshd\[16962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.36.108.202
2019-11-25T08:55:48.143698shield sshd\[16960\]: Failed password for invalid user pi from 118.36.108.202 port 51622 ssh2
2019-11-25 18:25:33
46.38.144.57 attackspambots
Nov 25 11:19:12 webserver postfix/smtpd\[25792\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 25 11:19:58 webserver postfix/smtpd\[25792\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 25 11:20:46 webserver postfix/smtpd\[25792\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 25 11:21:33 webserver postfix/smtpd\[25792\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 25 11:22:19 webserver postfix/smtpd\[25792\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-25 18:41:24
140.143.137.44 attackspambots
Nov 25 07:21:42 sd-53420 sshd\[18737\]: Invalid user chronicles from 140.143.137.44
Nov 25 07:21:42 sd-53420 sshd\[18737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.137.44
Nov 25 07:21:45 sd-53420 sshd\[18737\]: Failed password for invalid user chronicles from 140.143.137.44 port 51720 ssh2
Nov 25 07:25:18 sd-53420 sshd\[19245\]: Invalid user oracle from 140.143.137.44
Nov 25 07:25:18 sd-53420 sshd\[19245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.137.44
...
2019-11-25 18:35:25
52.42.253.100 attackspambots
11/25/2019-10:02:02.227775 52.42.253.100 Protocol: 6 SURICATA TLS invalid record/traffic
2019-11-25 18:12:29
141.226.11.26 attackspambots
141.226.11.26 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-25 18:13:38
188.126.72.120 attack
Unauthorised access (Nov 25) SRC=188.126.72.120 LEN=40 TTL=249 ID=18941 TCP DPT=1433 WINDOW=1024 SYN
2019-11-25 18:34:53
67.164.66.253 attackspambots
67.164.66.253 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-25 18:30:53
103.76.252.6 attackbotsspam
F2B jail: sshd. Time: 2019-11-25 09:09:23, Reported by: VKReport
2019-11-25 18:32:21
187.162.245.156 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-25 18:10:59
61.222.56.80 attackbotsspam
Nov 24 15:37:13 vpxxxxxxx22308 sshd[8136]: Invalid user server from 61.222.56.80
Nov 24 15:37:13 vpxxxxxxx22308 sshd[8136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.222.56.80
Nov 24 15:37:15 vpxxxxxxx22308 sshd[8136]: Failed password for invalid user server from 61.222.56.80 port 51244 ssh2
Nov 24 15:40:57 vpxxxxxxx22308 sshd[8679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.222.56.80  user=r.r
Nov 24 15:40:58 vpxxxxxxx22308 sshd[8679]: Failed password for r.r from 61.222.56.80 port 58608 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=61.222.56.80
2019-11-25 18:12:02
185.143.223.81 attack
Nov 25 11:13:12 h2177944 kernel: \[7552132.716358\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=27600 PROTO=TCP SPT=48939 DPT=57906 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 25 11:15:13 h2177944 kernel: \[7552254.076526\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=8955 PROTO=TCP SPT=48939 DPT=62239 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 25 11:16:27 h2177944 kernel: \[7552328.050174\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=22269 PROTO=TCP SPT=48939 DPT=19691 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 25 11:16:37 h2177944 kernel: \[7552337.565562\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=34610 PROTO=TCP SPT=48939 DPT=40548 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 25 11:31:38 h2177944 kernel: \[7553239.218295\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.2
2019-11-25 18:44:24
197.248.16.118 attackspambots
Nov 25 09:15:18 vpn01 sshd[5593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.16.118
Nov 25 09:15:20 vpn01 sshd[5593]: Failed password for invalid user mancret from 197.248.16.118 port 9562 ssh2
...
2019-11-25 18:25:10
112.21.191.252 attackspam
ssh failed login
2019-11-25 18:33:21

Recently Reported IPs

16.72.147.227 47.237.165.223 146.68.195.84 143.9.195.1
235.28.85.109 57.70.9.174 199.62.166.13 145.24.66.91
23.150.55.48 213.31.71.28 233.39.238.77 194.203.143.198
61.170.36.63 208.238.26.34 17.121.190.1 65.21.254.92
215.252.92.73 237.21.100.2 37.33.253.200 255.180.1.14