Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.80.137.153 attackspambots
Web Server Scan. RayID: 590c5cc7ee296e42, UA: Mozilla/4.049897920 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729), Country: CN
2020-05-21 04:11:37
112.80.137.72 attack
Unauthorized connection attempt detected from IP address 112.80.137.72 to port 22 [J]
2020-03-02 19:32:51
112.80.137.30 attackspam
Unauthorized connection attempt detected from IP address 112.80.137.30 to port 9991 [T]
2020-01-27 15:42:09
112.80.137.97 attackbotsspam
Unauthorized connection attempt detected from IP address 112.80.137.97 to port 8081 [T]
2020-01-10 08:56:25
112.80.137.144 attack
CN_APNIC-HM_<177>1578575004 [1:2013053:1] ET WEB_SERVER PyCurl Suspicious User Agent Inbound [Classification: Attempted Information Leak] [Priority: 2]:  {TCP} 112.80.137.144:59730
2020-01-10 03:04:32
112.80.137.119 attackspam
Unauthorized connection attempt detected from IP address 112.80.137.119 to port 3128
2019-12-31 08:08:24
112.80.137.14 attackbots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 05:16:33
112.80.137.34 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 54101e30ae016e18 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: theme-suka.skk.moe | User-Agent: Mozilla/5.051975669 Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:43:04
112.80.137.117 attack
The IP has triggered Cloudflare WAF. CF-Ray: 54147ae5dbc76bb4 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Mobile Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:04:43
112.80.137.189 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 541570716d3c9641 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.062334851 Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 05:07:54
112.80.137.13 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 541062388e246c56 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.051975669 Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:17:30
112.80.137.39 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 54104ef0f857ed47 | WAF_Rule_ID: 1025440 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:34:56
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.80.137.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21703
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.80.137.63.			IN	A

;; AUTHORITY SECTION:
.			463	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030102 1800 900 604800 86400

;; Query time: 179 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 12:25:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 63.137.80.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 63.137.80.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.136 attackbots
2020-02-21T14:33:37.5240651240 sshd\[1406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136  user=root
2020-02-21T14:33:38.8659001240 sshd\[1406\]: Failed password for root from 222.186.42.136 port 18758 ssh2
2020-02-21T14:33:41.0447501240 sshd\[1406\]: Failed password for root from 222.186.42.136 port 18758 ssh2
...
2020-02-21 21:33:59
106.13.144.8 attackspambots
Feb 21 14:20:51 host sshd[1005]: Invalid user ics from 106.13.144.8 port 38184
...
2020-02-21 21:36:35
190.15.81.154 attack
Brute force attempt
2020-02-21 21:50:00
156.96.48.132 attackbotsspam
suspicious action Fri, 21 Feb 2020 10:20:49 -0300
2020-02-21 21:39:05
59.46.70.107 attack
Feb 21 14:20:46 mout sshd[11795]: Invalid user ts3bot from 59.46.70.107 port 42769
2020-02-21 21:40:59
106.13.86.236 attackspam
Feb 21 18:20:59 gw1 sshd[9413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.86.236
Feb 21 18:21:00 gw1 sshd[9413]: Failed password for invalid user wangxue from 106.13.86.236 port 40508 ssh2
...
2020-02-21 21:28:48
222.186.169.194 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
Failed password for root from 222.186.169.194 port 27680 ssh2
Failed password for root from 222.186.169.194 port 27680 ssh2
Failed password for root from 222.186.169.194 port 27680 ssh2
Failed password for root from 222.186.169.194 port 27680 ssh2
2020-02-21 22:02:36
120.71.145.166 attackbots
Feb 21 14:48:34 dedicated sshd[2226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.145.166  user=root
Feb 21 14:48:37 dedicated sshd[2226]: Failed password for root from 120.71.145.166 port 33983 ssh2
2020-02-21 22:06:43
123.126.82.7 attackspambots
Feb 21 10:26:40 ws22vmsma01 sshd[170638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.126.82.7
Feb 21 10:26:42 ws22vmsma01 sshd[170638]: Failed password for invalid user remote from 123.126.82.7 port 2699 ssh2
...
2020-02-21 22:07:20
96.9.72.40 attack
Automatic report - Port Scan Attack
2020-02-21 21:57:55
183.82.121.81 attack
suspicious action Fri, 21 Feb 2020 10:20:18 -0300
2020-02-21 22:04:57
222.186.30.145 attackspambots
Feb 21 14:42:14 MK-Soft-VM7 sshd[6674]: Failed password for root from 222.186.30.145 port 31756 ssh2
Feb 21 14:42:18 MK-Soft-VM7 sshd[6674]: Failed password for root from 222.186.30.145 port 31756 ssh2
...
2020-02-21 21:44:08
123.179.6.178 attackspam
Fail2Ban Ban Triggered
2020-02-21 21:59:36
104.244.72.115 attack
02/21/2020-14:20:55.747469 104.244.72.115 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 2
2020-02-21 21:33:41
46.101.164.47 attack
Feb 21 14:17:38 MK-Soft-Root2 sshd[629]: Failed password for gnats from 46.101.164.47 port 48991 ssh2
Feb 21 14:20:48 MK-Soft-Root2 sshd[1362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.164.47 
...
2020-02-21 21:39:34

Recently Reported IPs

78.148.181.5 112.80.137.89 112.80.137.95 112.80.138.107
112.80.138.128 112.80.138.15 112.80.138.16 112.80.138.161
131.96.65.141 112.80.138.178 112.80.138.20 112.80.138.222
112.80.138.233 112.80.138.247 112.80.138.41 112.80.138.70
112.80.138.96 112.80.139.1 112.80.139.184 112.80.139.189