Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.80.136.135 attackspam
Unauthorized connection attempt detected from IP address 112.80.136.135 to port 8088
2020-06-01 00:45:42
112.80.136.245 attack
Unauthorized connection attempt detected from IP address 112.80.136.245 to port 3389 [J]
2020-03-02 21:35:54
112.80.136.176 attack
Unauthorized connection attempt detected from IP address 112.80.136.176 to port 8081 [J]
2020-03-02 18:41:32
112.80.136.214 attackbotsspam
Unauthorized connection attempt detected from IP address 112.80.136.214 to port 9999 [T]
2020-01-10 09:22:18
112.80.136.219 attackspam
Unauthorized connection attempt detected from IP address 112.80.136.219 to port 8118
2020-01-02 21:21:29
112.80.136.25 attack
The IP has triggered Cloudflare WAF. CF-Ray: 543405f8ef3b6cfe | WAF_Rule_ID: 1112824 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (Linux; U; Android 4.3; en-us; SM-N900T Build/JSS15J) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:33:44
112.80.136.8 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 5415f75a7ae2288c | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.077692140 Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 04:38:18
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.80.136.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.80.136.136.			IN	A

;; AUTHORITY SECTION:
.			326	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 03:10:24 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 136.136.80.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.136.80.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
151.51.245.48 attack
Jul 26 09:13:51 nextcloud sshd\[21970\]: Invalid user admin from 151.51.245.48
Jul 26 09:13:51 nextcloud sshd\[21970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.51.245.48
Jul 26 09:13:54 nextcloud sshd\[21970\]: Failed password for invalid user admin from 151.51.245.48 port 49133 ssh2
...
2019-07-26 15:59:21
94.191.54.37 attackbotsspam
Jul 26 08:42:09 localhost sshd\[58672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.54.37  user=www-data
Jul 26 08:42:11 localhost sshd\[58672\]: Failed password for www-data from 94.191.54.37 port 35816 ssh2
...
2019-07-26 15:55:52
201.148.247.240 attackbotsspam
Unauthorized connection attempt from IP address 201.148.247.240 on Port 25(SMTP)
2019-07-26 15:27:25
187.188.145.145 attack
Unauthorized connection attempt from IP address 187.188.145.145 on Port 445(SMB)
2019-07-26 15:21:21
46.1.109.113 attack
Honeypot attack, port: 23, PTR: 46-1-109-113.milleni.com.tr.
2019-07-26 15:17:26
104.143.83.4 attackbotsspam
Unauthorized connection attempt from IP address 104.143.83.4 on Port 139(NETBIOS)
2019-07-26 16:07:23
69.75.91.250 attackspambots
Jul 26 08:15:19 dev postfix/smtpd\[587\]: warning: rrcs-69-75-91-250.west.biz.rr.com\[69.75.91.250\]: SASL LOGIN authentication failed: authentication failure
Jul 26 08:15:20 dev postfix/smtpd\[587\]: warning: rrcs-69-75-91-250.west.biz.rr.com\[69.75.91.250\]: SASL LOGIN authentication failed: authentication failure
Jul 26 08:15:21 dev postfix/smtpd\[587\]: warning: rrcs-69-75-91-250.west.biz.rr.com\[69.75.91.250\]: SASL LOGIN authentication failed: authentication failure
Jul 26 08:15:21 dev postfix/smtpd\[587\]: warning: rrcs-69-75-91-250.west.biz.rr.com\[69.75.91.250\]: SASL LOGIN authentication failed: authentication failure
Jul 26 08:15:22 dev postfix/smtpd\[587\]: warning: rrcs-69-75-91-250.west.biz.rr.com\[69.75.91.250\]: SASL LOGIN authentication failed: authentication failure
2019-07-26 15:37:48
125.163.130.36 attack
:
2019-07-26 15:57:14
223.83.155.77 attack
Invalid user search from 223.83.155.77 port 33784
2019-07-26 16:09:27
77.81.19.219 attackbotsspam
:
2019-07-26 15:37:19
213.252.245.211 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-26 15:17:59
52.64.23.37 attackspambots
Jul 26 09:30:59 mail sshd\[22999\]: Invalid user train10 from 52.64.23.37 port 45880
Jul 26 09:30:59 mail sshd\[22999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.64.23.37
Jul 26 09:31:01 mail sshd\[22999\]: Failed password for invalid user train10 from 52.64.23.37 port 45880 ssh2
Jul 26 09:36:45 mail sshd\[23850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.64.23.37  user=root
Jul 26 09:36:47 mail sshd\[23850\]: Failed password for root from 52.64.23.37 port 41522 ssh2
2019-07-26 15:49:36
177.44.24.233 attackspambots
Unauthorized connection attempt from IP address 177.44.24.233 on Port 25(SMTP)
2019-07-26 15:16:32
103.18.0.34 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-26 15:24:43
62.213.92.38 attackbotsspam
firewall-block, port(s): 3389/tcp
2019-07-26 15:49:00

Recently Reported IPs

112.80.136.127 112.78.4.203 112.80.136.151 112.8.115.14
112.80.136.158 112.8.223.42 112.78.4.18 112.80.136.172
112.80.136.154 112.80.139.160 112.80.139.163 112.80.139.181
112.80.139.178 112.80.139.19 112.80.139.197 112.80.139.201
112.80.139.190 112.80.139.195 113.102.206.136 113.102.206.186