Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.80.137.153 attackspambots
Web Server Scan. RayID: 590c5cc7ee296e42, UA: Mozilla/4.049897920 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729), Country: CN
2020-05-21 04:11:37
112.80.137.72 attack
Unauthorized connection attempt detected from IP address 112.80.137.72 to port 22 [J]
2020-03-02 19:32:51
112.80.137.30 attackspam
Unauthorized connection attempt detected from IP address 112.80.137.30 to port 9991 [T]
2020-01-27 15:42:09
112.80.137.97 attackbotsspam
Unauthorized connection attempt detected from IP address 112.80.137.97 to port 8081 [T]
2020-01-10 08:56:25
112.80.137.144 attack
CN_APNIC-HM_<177>1578575004 [1:2013053:1] ET WEB_SERVER PyCurl Suspicious User Agent Inbound [Classification: Attempted Information Leak] [Priority: 2]:  {TCP} 112.80.137.144:59730
2020-01-10 03:04:32
112.80.137.119 attackspam
Unauthorized connection attempt detected from IP address 112.80.137.119 to port 3128
2019-12-31 08:08:24
112.80.137.14 attackbots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 05:16:33
112.80.137.34 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 54101e30ae016e18 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: theme-suka.skk.moe | User-Agent: Mozilla/5.051975669 Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:43:04
112.80.137.117 attack
The IP has triggered Cloudflare WAF. CF-Ray: 54147ae5dbc76bb4 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Mobile Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:04:43
112.80.137.189 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 541570716d3c9641 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.062334851 Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 05:07:54
112.80.137.13 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 541062388e246c56 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.051975669 Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:17:30
112.80.137.39 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 54104ef0f857ed47 | WAF_Rule_ID: 1025440 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:34:56
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.80.137.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.80.137.199.			IN	A

;; AUTHORITY SECTION:
.			150	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:33:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 199.137.80.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 199.137.80.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.151.27.166 attackspambots
Apr 28 07:59:46 vps647732 sshd[23549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.151.27.166
Apr 28 07:59:48 vps647732 sshd[23549]: Failed password for invalid user cacti from 52.151.27.166 port 47504 ssh2
...
2020-04-28 16:09:44
110.8.67.146 attackbots
Apr 28 09:05:47 hell sshd[25244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.8.67.146
Apr 28 09:05:49 hell sshd[25244]: Failed password for invalid user johan from 110.8.67.146 port 36754 ssh2
...
2020-04-28 16:02:28
159.253.30.226 attackbots
Port probing on unauthorized port 37904
2020-04-28 15:45:30
51.75.246.107 attackspambots
Apr 28 07:20:32 prox sshd[7089]: Failed password for root from 51.75.246.107 port 39982 ssh2
2020-04-28 16:00:35
118.89.188.111 attack
SSH login attempts.
2020-04-28 15:49:53
149.202.55.18 attack
Triggered by Fail2Ban at Ares web server
2020-04-28 15:26:07
185.50.149.17 attack
Apr 28 09:31:37 relay postfix/smtpd\[1082\]: warning: unknown\[185.50.149.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 28 09:31:54 relay postfix/smtpd\[14747\]: warning: unknown\[185.50.149.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 28 09:32:28 relay postfix/smtpd\[1082\]: warning: unknown\[185.50.149.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 28 09:32:28 relay postfix/smtpd\[15412\]: warning: unknown\[185.50.149.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 28 09:44:15 relay postfix/smtpd\[15412\]: warning: unknown\[185.50.149.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 28 09:44:15 relay postfix/smtpd\[15413\]: warning: unknown\[185.50.149.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-28 15:55:37
106.13.63.120 attackspambots
DATE:2020-04-28 07:52:45, IP:106.13.63.120, PORT:ssh SSH brute force auth (docker-dc)
2020-04-28 15:32:00
223.149.1.19 attackbotsspam
Automatic report - Port Scan Attack
2020-04-28 15:30:05
106.13.63.215 attackspambots
Invalid user file from 106.13.63.215 port 57802
2020-04-28 15:29:11
45.14.151.246 attackspambots
SSH Scan
2020-04-28 16:10:01
128.199.58.191 attackspambots
Port scan(s) denied
2020-04-28 15:28:16
54.39.147.2 attackbots
SSH login attempts.
2020-04-28 15:37:51
140.213.1.116 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-04-28 16:05:10
62.212.163.211 attackbotsspam
Port probing on unauthorized port 47438
2020-04-28 15:29:36

Recently Reported IPs

112.80.137.209 112.80.137.245 112.80.137.225 112.80.137.24
112.80.137.35 112.80.137.247 112.80.137.182 112.80.137.246
112.80.137.41 112.80.137.171 112.80.137.190 112.80.137.45
112.80.137.51 112.80.137.60 112.80.137.48 112.80.137.54
112.80.137.86 112.80.138.103 112.80.138.105 112.80.137.69