Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.219.188.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55877
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.219.188.18.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 09:13:44 CST 2025
;; MSG SIZE  rcvd: 106
Host info
18.188.219.80.in-addr.arpa domain name pointer 80-219-188-18.dclient.hispeed.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.188.219.80.in-addr.arpa	name = 80-219-188-18.dclient.hispeed.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.129.34.166 attack
SSH Brute Force
2020-08-20 01:31:04
123.31.26.130 attackspam
Aug 19 16:14:15 scw-focused-cartwright sshd[32154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.26.130
Aug 19 16:14:16 scw-focused-cartwright sshd[32154]: Failed password for invalid user ftpuser from 123.31.26.130 port 48060 ssh2
2020-08-20 01:27:20
103.216.216.206 attack
Port Scan
...
2020-08-20 00:57:28
162.243.99.164 attack
Failed password for invalid user wyd from 162.243.99.164 port 47318 ssh2
2020-08-20 01:02:17
213.32.11.200 attackspam
prod6
...
2020-08-20 01:12:05
167.99.162.47 attackbotsspam
$f2bV_matches
2020-08-20 01:24:59
113.190.255.198 attackbots
Dovecot Invalid User Login Attempt.
2020-08-20 00:58:36
51.178.86.97 attack
Triggered by Fail2Ban at Ares web server
2020-08-20 01:13:18
198.199.104.179 attackspam
GET /.well-known/dnt-policy.txt access attempts
2020-08-20 01:01:57
36.155.115.95 attackbotsspam
Aug 17 02:11:45 zatuno sshd[76433]: Failed password for invalid user lewis from 36.155.115.95 port 40147 ssh2
2020-08-20 01:20:40
220.134.218.112 attack
Aug 19 19:12:14 jane sshd[22163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.218.112 
Aug 19 19:12:17 jane sshd[22163]: Failed password for invalid user chong from 220.134.218.112 port 33612 ssh2
...
2020-08-20 01:22:49
104.211.241.188 attackspam
2020-08-19T12:53:38.655652abusebot-7.cloudsearch.cf sshd[27388]: Invalid user student05 from 104.211.241.188 port 50544
2020-08-19T12:53:38.659515abusebot-7.cloudsearch.cf sshd[27388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.241.188
2020-08-19T12:53:38.655652abusebot-7.cloudsearch.cf sshd[27388]: Invalid user student05 from 104.211.241.188 port 50544
2020-08-19T12:53:40.730179abusebot-7.cloudsearch.cf sshd[27388]: Failed password for invalid user student05 from 104.211.241.188 port 50544 ssh2
2020-08-19T12:58:39.581211abusebot-7.cloudsearch.cf sshd[27620]: Invalid user wilma from 104.211.241.188 port 59892
2020-08-19T12:58:39.587685abusebot-7.cloudsearch.cf sshd[27620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.241.188
2020-08-19T12:58:39.581211abusebot-7.cloudsearch.cf sshd[27620]: Invalid user wilma from 104.211.241.188 port 59892
2020-08-19T12:58:41.311980abusebot-7.cloudsea
...
2020-08-20 01:33:45
23.236.229.235 attackspambots
(From merle.boehm@gmail.com) Hi,

We're wondering if you've ever considered taking the content from aquilinochiro.com and converting it into videos to promote on Youtube? You simply add the text and it converts it into scenes that make up a full video. No special skills are needed, and there's access to over 1 million images/clips that can be used.

You can read more about the software here: https://bit.ly/3iDadz0

Kind Regards,
Merle
2020-08-20 00:56:30
192.119.68.138 attack
E-Mail Spam (RBL) [REJECTED]
2020-08-20 01:08:24
186.122.149.144 attackbotsspam
Aug 19 14:28:33 cosmoit sshd[19751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.149.144
2020-08-20 01:34:03

Recently Reported IPs

97.179.192.207 75.70.241.182 28.215.234.230 171.35.158.174
71.128.4.76 229.208.87.45 99.196.242.63 244.152.64.203
252.223.140.135 45.247.96.156 163.121.184.69 93.232.130.120
195.63.141.93 250.85.19.38 20.234.86.251 91.116.172.141
71.239.66.79 27.7.110.138 32.64.230.1 235.29.84.133