Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.172.131.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4694
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.172.131.24.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 21:59:47 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 24.131.172.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 24.131.172.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.240.118.24 attackspam
Port scan on 6 port(s): 53279 53413 53535 53633 53689 53740
2020-06-18 23:31:22
31.20.193.52 attack
Jun 18 15:37:31 sip sshd[5579]: Failed password for root from 31.20.193.52 port 56018 ssh2
Jun 18 15:45:26 sip sshd[8521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.20.193.52
Jun 18 15:45:28 sip sshd[8521]: Failed password for invalid user olt from 31.20.193.52 port 52520 ssh2
2020-06-18 23:00:25
110.147.213.70 attack
2020-06-18T14:14:08+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-06-18 23:21:58
220.132.182.9 attackspam
Port Scan detected!
...
2020-06-18 23:31:48
45.135.187.22 attack
0,31-00/00 [bc00/m53] PostRequest-Spammer scoring: Durban01
2020-06-18 23:04:07
183.89.229.137 attackspam
2020-06-18T15:07:30.118061mail1.gph.lt auth[37908]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=junkowxd@stepracing.lt rhost=183.89.229.137
...
2020-06-18 23:01:36
203.195.130.233 attack
Jun 18 15:11:29 vps sshd[270022]: Failed password for root from 203.195.130.233 port 47042 ssh2
Jun 18 15:14:06 vps sshd[280134]: Invalid user kz from 203.195.130.233 port 48990
Jun 18 15:14:06 vps sshd[280134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.130.233
Jun 18 15:14:08 vps sshd[280134]: Failed password for invalid user kz from 203.195.130.233 port 48990 ssh2
Jun 18 15:16:53 vps sshd[294371]: Invalid user cloud from 203.195.130.233 port 50934
...
2020-06-18 23:26:15
106.52.107.70 attackbots
Jun 18 14:31:54 srv1 sshd[30248]: Invalid user moodle from 106.52.107.70
Jun 18 14:31:56 srv1 sshd[30248]: Failed password for invalid user moodle from 106.52.107.70 port 59612 ssh2
Jun 18 15:06:04 srv1 sshd[25974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.107.70  user=r.r
Jun 18 15:06:06 srv1 sshd[25974]: Failed password for r.r from 106.52.107.70 port 58944 ssh2
Jun 18 15:07:55 srv1 sshd[27999]: Invalid user abi from 106.52.107.70


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.52.107.70
2020-06-18 23:43:45
36.111.182.35 attack
Jun 18 19:54:07 itv-usvr-01 sshd[27549]: Invalid user agd from 36.111.182.35
Jun 18 19:54:07 itv-usvr-01 sshd[27549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182.35
Jun 18 19:54:07 itv-usvr-01 sshd[27549]: Invalid user agd from 36.111.182.35
Jun 18 19:54:09 itv-usvr-01 sshd[27549]: Failed password for invalid user agd from 36.111.182.35 port 58510 ssh2
Jun 18 19:59:41 itv-usvr-01 sshd[27774]: Invalid user tommy from 36.111.182.35
2020-06-18 22:58:03
180.76.156.150 attack
prod6
...
2020-06-18 23:06:33
34.84.211.138 attack
Jun 18 12:46:05 ns sshd[19423]: Connection from 34.84.211.138 port 57984 on 134.119.39.98 port 22
Jun 18 12:46:07 ns sshd[19423]: Invalid user vic from 34.84.211.138 port 57984
Jun 18 12:46:07 ns sshd[19423]: Failed password for invalid user vic from 34.84.211.138 port 57984 ssh2
Jun 18 12:46:07 ns sshd[19423]: Received disconnect from 34.84.211.138 port 57984:11: Bye Bye [preauth]
Jun 18 12:46:07 ns sshd[19423]: Disconnected from 34.84.211.138 port 57984 [preauth]
Jun 18 12:57:46 ns sshd[28349]: Connection from 34.84.211.138 port 60276 on 134.119.39.98 port 22
Jun 18 12:57:50 ns sshd[28349]: User r.r from 34.84.211.138 not allowed because not listed in AllowUsers
Jun 18 12:57:50 ns sshd[28349]: Failed password for invalid user r.r from 34.84.211.138 port 60276 ssh2
Jun 18 12:57:51 ns sshd[28349]: Received disconnect from 34.84.211.138 port 60276:11: Bye Bye [preauth]
Jun 18 12:57:51 ns sshd[28349]: Disconnected from 34.84.211.138 port 60276 [preauth]
Jun 18 13:07:25 ns........
-------------------------------
2020-06-18 23:04:44
190.205.59.6 attackbotsspam
Jun 18 16:11:29 nextcloud sshd\[16994\]: Invalid user r from 190.205.59.6
Jun 18 16:11:29 nextcloud sshd\[16994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.205.59.6
Jun 18 16:11:31 nextcloud sshd\[16994\]: Failed password for invalid user r from 190.205.59.6 port 34826 ssh2
2020-06-18 23:39:31
190.145.78.212 attack
20/6/18@08:07:32: FAIL: Alarm-Network address from=190.145.78.212
20/6/18@08:07:32: FAIL: Alarm-Network address from=190.145.78.212
...
2020-06-18 22:59:42
117.232.127.51 attack
Jun 18 20:47:29 dhoomketu sshd[857786]: Invalid user cable from 117.232.127.51 port 48020
Jun 18 20:47:29 dhoomketu sshd[857786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.232.127.51 
Jun 18 20:47:29 dhoomketu sshd[857786]: Invalid user cable from 117.232.127.51 port 48020
Jun 18 20:47:31 dhoomketu sshd[857786]: Failed password for invalid user cable from 117.232.127.51 port 48020 ssh2
Jun 18 20:50:38 dhoomketu sshd[857811]: Invalid user abc123 from 117.232.127.51 port 53964
...
2020-06-18 23:27:15
37.153.173.56 attack
Jun 18 13:10:37 ns sshd[29620]: Connection from 37.153.173.56 port 57544 on 134.119.39.98 port 22
Jun 18 13:10:37 ns sshd[29620]: Invalid user oracle from 37.153.173.56 port 57544
Jun 18 13:10:37 ns sshd[29620]: Failed password for invalid user oracle from 37.153.173.56 port 57544 ssh2
Jun 18 13:10:37 ns sshd[29620]: Received disconnect from 37.153.173.56 port 57544:11: Bye Bye [preauth]
Jun 18 13:10:37 ns sshd[29620]: Disconnected from 37.153.173.56 port 57544 [preauth]
Jun 18 13:15:40 ns sshd[27173]: Connection from 37.153.173.56 port 44238 on 134.119.39.98 port 22
Jun 18 13:15:42 ns sshd[27173]: Invalid user wmdemo from 37.153.173.56 port 44238
Jun 18 13:15:42 ns sshd[27173]: Failed password for invalid user wmdemo from 37.153.173.56 port 44238 ssh2
Jun 18 13:15:42 ns sshd[27173]: Received disconnect from 37.153.173.56 port 44238:11: Bye Bye [preauth]
Jun 18 13:15:42 ns sshd[27173]: Disconnected from 37.153.173.56 port 44238 [preauth]
Jun 18 13:19:09 ns sshd[4546]: C........
-------------------------------
2020-06-18 23:11:05

Recently Reported IPs

85.153.238.114 240.224.143.115 168.26.32.46 174.143.119.14
27.58.192.228 122.60.243.140 32.12.135.45 72.243.195.140
185.69.71.85 219.185.106.215 34.189.151.75 174.114.191.87
5.83.4.0 26.153.196.184 98.190.2.196 48.91.163.120
230.105.10.241 220.182.246.241 56.27.247.197 52.102.113.114