Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.80.139.186 attackbotsspam
Unauthorized connection attempt detected from IP address 112.80.139.186 to port 8118 [J]
2020-03-02 16:46:43
112.80.139.72 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5430ed179f239666 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/4.054101423 Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1) | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 00:47:55
112.80.139.237 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5415a92e09326bf6 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.0 (Linux; U; Android 4.3; en-us; SM-N900T Build/JSS15J) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:55:56
112.80.139.252 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 5413c84ba8846d04 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.066704189 Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 02:00:28
112.80.139.3 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5410ce0509096bc6 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.084743666 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 00:41:24
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.80.139.167
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.80.139.167.			IN	A

;; AUTHORITY SECTION:
.			267	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 07 22:57:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 167.139.80.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 167.139.80.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
204.48.31.193 attack
Sep 30 00:17:30 TORMINT sshd\[31453\]: Invalid user pi from 204.48.31.193
Sep 30 00:17:30 TORMINT sshd\[31453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.31.193
Sep 30 00:17:32 TORMINT sshd\[31453\]: Failed password for invalid user pi from 204.48.31.193 port 49542 ssh2
...
2019-09-30 16:10:47
51.38.186.47 attackbots
Sep 30 10:10:41 SilenceServices sshd[29952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47
Sep 30 10:10:44 SilenceServices sshd[29952]: Failed password for invalid user que from 51.38.186.47 port 57442 ssh2
Sep 30 10:14:38 SilenceServices sshd[30977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47
2019-09-30 16:31:53
192.241.183.220 attack
Sep 30 10:12:17 eventyay sshd[10563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.183.220
Sep 30 10:12:19 eventyay sshd[10563]: Failed password for invalid user guest from 192.241.183.220 port 42220 ssh2
Sep 30 10:16:32 eventyay sshd[10619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.183.220
...
2019-09-30 16:23:06
222.186.173.238 attackspam
Sep 30 10:07:59 vpn01 sshd[3149]: Failed password for root from 222.186.173.238 port 42972 ssh2
Sep 30 10:08:14 vpn01 sshd[3149]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 42972 ssh2 [preauth]
...
2019-09-30 16:15:51
87.96.139.46 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/87.96.139.46/ 
 SE - 1H : (167)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : SE 
 NAME ASN : ASN45011 
 
 IP : 87.96.139.46 
 
 CIDR : 87.96.128.0/17 
 
 PREFIX COUNT : 101 
 
 UNIQUE IP COUNT : 526592 
 
 
 WYKRYTE ATAKI Z ASN45011 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 4 
 24H - 19 
 
 INFO : SERVER - ABB - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-09-30 16:25:16
199.116.118.246 attack
2749/udp
[2019-09-30]1pkt
2019-09-30 16:39:06
115.112.176.198 attackbots
Sep 30 10:05:20 vps647732 sshd[2512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.112.176.198
Sep 30 10:05:22 vps647732 sshd[2512]: Failed password for invalid user admin from 115.112.176.198 port 48482 ssh2
...
2019-09-30 16:18:39
79.127.22.147 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/79.127.22.147/ 
 IR - 1H : (191)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IR 
 NAME ASN : ASN43754 
 
 IP : 79.127.22.147 
 
 CIDR : 79.127.16.0/21 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 163072 
 
 
 WYKRYTE ATAKI Z ASN43754 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 4 
 24H - 10 
 
 INFO : SERVER - ABB - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-09-30 16:25:49
106.12.215.223 attackbots
2019-09-30T08:29:45.206502abusebot-5.cloudsearch.cf sshd\[3967\]: Invalid user proftpd from 106.12.215.223 port 38398
2019-09-30 16:50:33
1.64.217.181 attackbotsspam
5555/tcp 5555/tcp 5555/tcp
[2019-09-30]3pkt
2019-09-30 16:14:02
162.214.14.3 attackbots
2019-09-30T07:06:00.459039abusebot-5.cloudsearch.cf sshd\[3467\]: Invalid user teste from 162.214.14.3 port 38354
2019-09-30 16:21:46
111.231.54.248 attack
Sep 30 07:57:51 lnxmysql61 sshd[1941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.54.248
2019-09-30 16:44:38
122.192.33.102 attackbots
Sep 30 00:43:10 mail sshd\[15946\]: Invalid user anon from 122.192.33.102
Sep 30 00:43:10 mail sshd\[15946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.192.33.102
...
2019-09-30 16:30:06
18.27.197.252 attack
Sep 30 09:21:13 rotator sshd\[31636\]: Failed password for root from 18.27.197.252 port 45036 ssh2Sep 30 09:21:15 rotator sshd\[31636\]: Failed password for root from 18.27.197.252 port 45036 ssh2Sep 30 09:21:18 rotator sshd\[31636\]: Failed password for root from 18.27.197.252 port 45036 ssh2Sep 30 09:21:21 rotator sshd\[31636\]: Failed password for root from 18.27.197.252 port 45036 ssh2Sep 30 09:21:24 rotator sshd\[31636\]: Failed password for root from 18.27.197.252 port 45036 ssh2Sep 30 09:21:27 rotator sshd\[31636\]: Failed password for root from 18.27.197.252 port 45036 ssh2
...
2019-09-30 16:26:14
14.183.72.31 attackspambots
8081/tcp
[2019-09-30]1pkt
2019-09-30 16:27:22

Recently Reported IPs

112.80.139.162 112.80.139.193 112.80.139.198 112.80.139.202
112.80.139.206 112.80.139.223 112.80.139.23 112.80.139.235
112.80.139.241 112.80.139.243 112.80.139.244 112.80.139.245
112.80.139.251 112.85.211.54 112.85.22.181 112.85.22.3
112.85.23.173 112.85.23.52 112.85.64.99 112.85.65.107