Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.80.136.135 attackspam
Unauthorized connection attempt detected from IP address 112.80.136.135 to port 8088
2020-06-01 00:45:42
112.80.136.245 attack
Unauthorized connection attempt detected from IP address 112.80.136.245 to port 3389 [J]
2020-03-02 21:35:54
112.80.136.176 attack
Unauthorized connection attempt detected from IP address 112.80.136.176 to port 8081 [J]
2020-03-02 18:41:32
112.80.136.214 attackbotsspam
Unauthorized connection attempt detected from IP address 112.80.136.214 to port 9999 [T]
2020-01-10 09:22:18
112.80.136.219 attackspam
Unauthorized connection attempt detected from IP address 112.80.136.219 to port 8118
2020-01-02 21:21:29
112.80.136.25 attack
The IP has triggered Cloudflare WAF. CF-Ray: 543405f8ef3b6cfe | WAF_Rule_ID: 1112824 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (Linux; U; Android 4.3; en-us; SM-N900T Build/JSS15J) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:33:44
112.80.136.8 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 5415f75a7ae2288c | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.077692140 Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 04:38:18
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.80.136.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40710
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.80.136.10.			IN	A

;; AUTHORITY SECTION:
.			357	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 167 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:04:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 10.136.80.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 10.136.80.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.167.11.100 attackspam
*Port Scan* detected from 104.167.11.100 (US/United States/-). 4 hits in the last 296 seconds
2020-02-21 02:20:15
203.160.59.153 attackspambots
Sending SPAM email
2020-02-21 02:17:24
178.128.150.158 attackbotsspam
Feb 20 14:36:13 srv-ubuntu-dev3 sshd[69102]: Invalid user hammad from 178.128.150.158
Feb 20 14:36:13 srv-ubuntu-dev3 sshd[69102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.158
Feb 20 14:36:13 srv-ubuntu-dev3 sshd[69102]: Invalid user hammad from 178.128.150.158
Feb 20 14:36:15 srv-ubuntu-dev3 sshd[69102]: Failed password for invalid user hammad from 178.128.150.158 port 33310 ssh2
Feb 20 14:39:07 srv-ubuntu-dev3 sshd[69509]: Invalid user tom from 178.128.150.158
Feb 20 14:39:07 srv-ubuntu-dev3 sshd[69509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.158
Feb 20 14:39:07 srv-ubuntu-dev3 sshd[69509]: Invalid user tom from 178.128.150.158
Feb 20 14:39:10 srv-ubuntu-dev3 sshd[69509]: Failed password for invalid user tom from 178.128.150.158 port 33516 ssh2
Feb 20 14:41:53 srv-ubuntu-dev3 sshd[69727]: Invalid user joyoudata from 178.128.150.158
...
2020-02-21 02:32:38
211.169.249.156 attackspam
Feb 20 15:57:07 web8 sshd\[1383\]: Invalid user Michelle from 211.169.249.156
Feb 20 15:57:07 web8 sshd\[1383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.169.249.156
Feb 20 15:57:09 web8 sshd\[1383\]: Failed password for invalid user Michelle from 211.169.249.156 port 52004 ssh2
Feb 20 15:59:58 web8 sshd\[2833\]: Invalid user user05 from 211.169.249.156
Feb 20 15:59:58 web8 sshd\[2833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.169.249.156
2020-02-21 02:26:25
155.4.70.10 attackbots
$f2bV_matches
2020-02-21 02:20:44
191.101.121.230 attackbotsspam
Unauthorized access detected from black listed ip!
2020-02-21 02:12:57
118.24.20.35 attack
Invalid user uno85 from 118.24.20.35 port 34534
2020-02-21 02:27:29
194.26.29.122 attackspambots
firewall-block, port(s): 23386/tcp, 23387/tcp, 43390/tcp, 53382/tcp, 63398/tcp
2020-02-21 02:23:30
68.115.188.98 attack
From CCTV User Interface Log
...::ffff:68.115.188.98 - - [20/Feb/2020:08:24:14 +0000] "GET / HTTP/1.1" 200 960
...
2020-02-21 02:46:06
120.69.218.73 attack
Portscan or hack attempt detected by psad/fwsnort
2020-02-21 02:34:00
198.108.67.38 attack
5226/tcp 646/tcp 8879/tcp...
[2019-12-20/2020-02-20]96pkt,89pt.(tcp)
2020-02-21 02:28:23
190.214.55.218 attack
suspicious action Thu, 20 Feb 2020 10:24:44 -0300
2020-02-21 02:29:24
118.24.161.205 attackspambots
Feb 20 14:51:09 h2779839 sshd[27516]: Invalid user gk from 118.24.161.205 port 48928
Feb 20 14:51:09 h2779839 sshd[27516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.161.205
Feb 20 14:51:09 h2779839 sshd[27516]: Invalid user gk from 118.24.161.205 port 48928
Feb 20 14:51:11 h2779839 sshd[27516]: Failed password for invalid user gk from 118.24.161.205 port 48928 ssh2
Feb 20 14:55:42 h2779839 sshd[27758]: Invalid user gitlab-prometheus from 118.24.161.205 port 49676
Feb 20 14:55:42 h2779839 sshd[27758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.161.205
Feb 20 14:55:42 h2779839 sshd[27758]: Invalid user gitlab-prometheus from 118.24.161.205 port 49676
Feb 20 14:55:45 h2779839 sshd[27758]: Failed password for invalid user gitlab-prometheus from 118.24.161.205 port 49676 ssh2
Feb 20 14:57:59 h2779839 sshd[27768]: Invalid user admin from 118.24.161.205 port 35934
...
2020-02-21 02:49:25
80.82.70.239 attackbotsspam
02/20/2020-19:06:47.202863 80.82.70.239 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2020-02-21 02:17:57
126.44.212.72 attackbots
Feb 20 15:24:36 cvbnet sshd[14579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.44.212.72 
Feb 20 15:24:37 cvbnet sshd[14579]: Failed password for invalid user cbiuser from 126.44.212.72 port 50974 ssh2
...
2020-02-21 02:47:44

Recently Reported IPs

112.78.213.129 112.80.136.113 112.80.136.116 112.8.128.3
112.94.252.135 112.94.103.111 112.94.101.238 112.94.101.253
112.94.166.238 112.94.252.169 112.94.252.130 112.94.168.240
112.94.101.7 112.94.252.184 112.94.103.4 112.94.168.51
112.94.252.186 112.94.252.203 112.94.252.220 112.94.252.232