Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.80.137.153 attackspambots
Web Server Scan. RayID: 590c5cc7ee296e42, UA: Mozilla/4.049897920 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729), Country: CN
2020-05-21 04:11:37
112.80.137.72 attack
Unauthorized connection attempt detected from IP address 112.80.137.72 to port 22 [J]
2020-03-02 19:32:51
112.80.137.30 attackspam
Unauthorized connection attempt detected from IP address 112.80.137.30 to port 9991 [T]
2020-01-27 15:42:09
112.80.137.97 attackbotsspam
Unauthorized connection attempt detected from IP address 112.80.137.97 to port 8081 [T]
2020-01-10 08:56:25
112.80.137.144 attack
CN_APNIC-HM_<177>1578575004 [1:2013053:1] ET WEB_SERVER PyCurl Suspicious User Agent Inbound [Classification: Attempted Information Leak] [Priority: 2]:  {TCP} 112.80.137.144:59730
2020-01-10 03:04:32
112.80.137.119 attackspam
Unauthorized connection attempt detected from IP address 112.80.137.119 to port 3128
2019-12-31 08:08:24
112.80.137.14 attackbots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 05:16:33
112.80.137.34 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 54101e30ae016e18 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: theme-suka.skk.moe | User-Agent: Mozilla/5.051975669 Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:43:04
112.80.137.117 attack
The IP has triggered Cloudflare WAF. CF-Ray: 54147ae5dbc76bb4 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Mobile Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:04:43
112.80.137.189 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 541570716d3c9641 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.062334851 Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 05:07:54
112.80.137.13 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 541062388e246c56 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.051975669 Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:17:30
112.80.137.39 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 54104ef0f857ed47 | WAF_Rule_ID: 1025440 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:34:56
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.80.137.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.80.137.93.			IN	A

;; AUTHORITY SECTION:
.			516	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 06:39:50 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 93.137.80.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 93.137.80.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.193.253.248 attack
proto=tcp  .  spt=58193  .  dpt=25  .     Found on   Blocklist de       (271)
2020-03-21 00:41:19
80.82.70.239 attackspam
03/20/2020-11:32:40.741512 80.82.70.239 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-20 23:57:29
117.196.232.54 attackbotsspam
Unauthorized IMAP connection attempt
2020-03-21 00:36:00
51.68.34.30 attackbotsspam
1 Attack(s) Detected
[DoS Attack: SYN/ACK Scan] from source: 51.68.34.30, port 21, Friday, March 20, 2020 05:12:22
2020-03-21 00:51:46
222.186.173.154 attackspam
Mar 20 17:29:09 meumeu sshd[13882]: Failed password for root from 222.186.173.154 port 64352 ssh2
Mar 20 17:29:13 meumeu sshd[13882]: Failed password for root from 222.186.173.154 port 64352 ssh2
Mar 20 17:29:25 meumeu sshd[13882]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 64352 ssh2 [preauth]
...
2020-03-21 00:36:51
50.3.60.7 attackspambots
Spam Timestamp : 20-Mar-20 13:04   BlockList Provider  truncate.gbudb.net   (269)
2020-03-21 00:58:13
121.241.244.92 attack
Mar 20 17:31:28 srv-ubuntu-dev3 sshd[20910]: Invalid user be from 121.241.244.92
Mar 20 17:31:28 srv-ubuntu-dev3 sshd[20910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92
Mar 20 17:31:28 srv-ubuntu-dev3 sshd[20910]: Invalid user be from 121.241.244.92
Mar 20 17:31:30 srv-ubuntu-dev3 sshd[20910]: Failed password for invalid user be from 121.241.244.92 port 60996 ssh2
Mar 20 17:35:21 srv-ubuntu-dev3 sshd[21470]: Invalid user install from 121.241.244.92
Mar 20 17:35:21 srv-ubuntu-dev3 sshd[21470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92
Mar 20 17:35:21 srv-ubuntu-dev3 sshd[21470]: Invalid user install from 121.241.244.92
Mar 20 17:35:23 srv-ubuntu-dev3 sshd[21470]: Failed password for invalid user install from 121.241.244.92 port 49137 ssh2
Mar 20 17:39:10 srv-ubuntu-dev3 sshd[22103]: Invalid user pl from 121.241.244.92
...
2020-03-21 00:46:25
112.85.42.178 attackspambots
Mar 20 13:45:21 firewall sshd[767]: Failed password for root from 112.85.42.178 port 3308 ssh2
Mar 20 13:45:24 firewall sshd[767]: Failed password for root from 112.85.42.178 port 3308 ssh2
Mar 20 13:45:28 firewall sshd[767]: Failed password for root from 112.85.42.178 port 3308 ssh2
...
2020-03-21 00:49:02
164.132.51.91 attack
Automatic report - Banned IP Access
2020-03-21 00:52:58
84.52.108.218 attack
proto=tcp  .  spt=48509  .  dpt=25  .     Listed on    MailSpike (spam wave plus L3-L5) also truncate-gbudb and unsubscore     (273)
2020-03-21 00:33:09
192.241.239.84 attackbotsspam
TCP 3389 (RDP)
2020-03-21 00:47:42
31.207.34.147 attack
Mar 20 13:45:57 web8 sshd\[8831\]: Invalid user tx from 31.207.34.147
Mar 20 13:45:57 web8 sshd\[8831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.207.34.147
Mar 20 13:45:59 web8 sshd\[8831\]: Failed password for invalid user tx from 31.207.34.147 port 45480 ssh2
Mar 20 13:52:48 web8 sshd\[12553\]: Invalid user im from 31.207.34.147
Mar 20 13:52:48 web8 sshd\[12553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.207.34.147
2020-03-21 00:51:01
79.135.40.228 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-20 23:57:58
14.29.250.133 attack
Mar 20 10:06:11 firewall sshd[23384]: Invalid user ma from 14.29.250.133
Mar 20 10:06:13 firewall sshd[23384]: Failed password for invalid user ma from 14.29.250.133 port 51726 ssh2
Mar 20 10:11:52 firewall sshd[23588]: Invalid user sinus from 14.29.250.133
...
2020-03-21 00:53:47
201.72.179.51 attack
Mar 20 13:47:08 nextcloud sshd\[26464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.72.179.51  user=gnats
Mar 20 13:47:10 nextcloud sshd\[26464\]: Failed password for gnats from 201.72.179.51 port 42914 ssh2
Mar 20 14:12:25 nextcloud sshd\[32648\]: Invalid user nodeserver from 201.72.179.51
Mar 20 14:12:25 nextcloud sshd\[32648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.72.179.51
2020-03-21 00:29:37

Recently Reported IPs

112.80.138.125 112.80.138.150 112.80.138.155 112.80.138.185
112.80.138.194 112.80.138.170 112.80.138.231 112.80.138.235
112.80.138.240 112.80.138.242 112.80.138.3 112.80.138.50
112.80.138.66 112.80.138.92 112.80.139.104 112.80.139.107
112.80.139.148 112.80.139.154 112.80.139.164 112.80.139.17