Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.80.138.90 attack
Unauthorized connection attempt detected from IP address 112.80.138.90 to port 1022 [T]
2020-05-20 10:22:53
112.80.138.255 attackbots
Unauthorized connection attempt detected from IP address 112.80.138.255 to port 3389 [J]
2020-03-02 21:35:30
112.80.138.109 attackspam
Unauthorized connection attempt detected from IP address 112.80.138.109 to port 80 [J]
2020-01-19 14:19:47
112.80.138.223 attackbots
Unauthorized connection attempt detected from IP address 112.80.138.223 to port 2095
2019-12-31 08:57:15
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.80.138.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.80.138.150.			IN	A

;; AUTHORITY SECTION:
.			139	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 06:39:50 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 150.138.80.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.138.80.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.122.156.79 attackbots
Aug 23 20:34:54 scw-tender-jepsen sshd[23542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.156.79
Aug 23 20:34:56 scw-tender-jepsen sshd[23542]: Failed password for invalid user os from 62.122.156.79 port 36392 ssh2
2020-08-24 05:13:50
118.25.104.200 attack
2020-08-23T20:45:21.596571shield sshd\[17198\]: Invalid user cwc from 118.25.104.200 port 35302
2020-08-23T20:45:21.605909shield sshd\[17198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.104.200
2020-08-23T20:45:23.379820shield sshd\[17198\]: Failed password for invalid user cwc from 118.25.104.200 port 35302 ssh2
2020-08-23T20:51:06.910753shield sshd\[18648\]: Invalid user git from 118.25.104.200 port 40696
2020-08-23T20:51:06.919516shield sshd\[18648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.104.200
2020-08-24 04:55:26
211.159.153.62 attack
2020-08-23T21:02:56.759883shield sshd\[22503\]: Invalid user ubuntu from 211.159.153.62 port 54288
2020-08-23T21:02:56.874958shield sshd\[22503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.153.62
2020-08-23T21:02:58.819889shield sshd\[22503\]: Failed password for invalid user ubuntu from 211.159.153.62 port 54288 ssh2
2020-08-23T21:07:30.907366shield sshd\[24148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.153.62  user=root
2020-08-23T21:07:33.135641shield sshd\[24148\]: Failed password for root from 211.159.153.62 port 50932 ssh2
2020-08-24 05:20:35
85.209.0.251 attack
Failed password for invalid user from 85.209.0.251 port 3064 ssh2
2020-08-24 05:03:43
166.175.56.124 attackbots
Brute forcing email accounts
2020-08-24 05:11:39
78.128.113.42 attackspambots
Port scan
2020-08-24 05:16:17
173.201.196.146 attackspambots
Attempt to log in with non-existing username: admin
2020-08-24 05:21:35
222.186.175.183 attackbots
Aug 23 22:08:05 rocket sshd[5357]: Failed password for root from 222.186.175.183 port 29624 ssh2
Aug 23 22:08:19 rocket sshd[5357]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 29624 ssh2 [preauth]
...
2020-08-24 05:08:41
189.207.110.146 attack
Automatic report - Port Scan Attack
2020-08-24 05:16:43
218.92.0.175 attack
SSH bruteforce
2020-08-24 04:56:27
106.13.167.3 attackbots
2020-08-23T22:26:54.211907vps751288.ovh.net sshd\[8335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.167.3  user=root
2020-08-23T22:26:56.683093vps751288.ovh.net sshd\[8335\]: Failed password for root from 106.13.167.3 port 54390 ssh2
2020-08-23T22:36:47.335260vps751288.ovh.net sshd\[8423\]: Invalid user admin from 106.13.167.3 port 33862
2020-08-23T22:36:47.344093vps751288.ovh.net sshd\[8423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.167.3
2020-08-23T22:36:49.554561vps751288.ovh.net sshd\[8423\]: Failed password for invalid user admin from 106.13.167.3 port 33862 ssh2
2020-08-24 04:58:50
222.186.175.182 attackbots
2020-08-23T22:51:15.576102vps773228.ovh.net sshd[31579]: Failed password for root from 222.186.175.182 port 45188 ssh2
2020-08-23T22:51:18.322019vps773228.ovh.net sshd[31579]: Failed password for root from 222.186.175.182 port 45188 ssh2
2020-08-23T22:51:21.815286vps773228.ovh.net sshd[31579]: Failed password for root from 222.186.175.182 port 45188 ssh2
2020-08-23T22:51:24.520429vps773228.ovh.net sshd[31579]: Failed password for root from 222.186.175.182 port 45188 ssh2
2020-08-23T22:51:27.503422vps773228.ovh.net sshd[31579]: Failed password for root from 222.186.175.182 port 45188 ssh2
...
2020-08-24 05:10:10
51.255.28.53 attackspam
Aug 23 22:49:21 electroncash sshd[30284]: Invalid user solen from 51.255.28.53 port 58312
Aug 23 22:49:21 electroncash sshd[30284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.28.53 
Aug 23 22:49:21 electroncash sshd[30284]: Invalid user solen from 51.255.28.53 port 58312
Aug 23 22:49:23 electroncash sshd[30284]: Failed password for invalid user solen from 51.255.28.53 port 58312 ssh2
Aug 23 22:52:54 electroncash sshd[31233]: Invalid user web from 51.255.28.53 port 38746
...
2020-08-24 05:01:28
212.83.183.57 attack
Aug 23 22:47:58 haigwepa sshd[30990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.183.57 
Aug 23 22:47:59 haigwepa sshd[30990]: Failed password for invalid user zero from 212.83.183.57 port 54290 ssh2
...
2020-08-24 05:05:56
139.198.122.19 attackspambots
Aug 23 21:04:43 onepixel sshd[3156114]: Failed password for invalid user aneta from 139.198.122.19 port 46386 ssh2
Aug 23 21:07:26 onepixel sshd[3156523]: Invalid user cgp from 139.198.122.19 port 59886
Aug 23 21:07:26 onepixel sshd[3156523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.122.19 
Aug 23 21:07:26 onepixel sshd[3156523]: Invalid user cgp from 139.198.122.19 port 59886
Aug 23 21:07:28 onepixel sshd[3156523]: Failed password for invalid user cgp from 139.198.122.19 port 59886 ssh2
2020-08-24 05:10:35

Recently Reported IPs

112.80.137.93 112.80.138.155 112.80.138.185 112.80.138.194
112.80.138.170 112.80.138.231 112.80.138.235 112.80.138.240
112.80.138.242 112.80.138.3 112.80.138.50 112.80.138.66
112.80.138.92 112.80.139.104 112.80.139.107 112.80.139.148
112.80.139.154 112.80.139.164 112.80.139.17 112.80.139.191