Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nanjing

Region: Jiangsu

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.80.31.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48282
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.80.31.71.			IN	A

;; AUTHORITY SECTION:
.			584	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024090700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 07 21:25:15 CST 2024
;; MSG SIZE  rcvd: 105
Host info
Host 71.31.80.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.31.80.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.183.236.211 attackspam
1585712792 - 04/01/2020 05:46:32 Host: 180.183.236.211/180.183.236.211 Port: 445 TCP Blocked
2020-04-01 19:34:26
46.242.83.186 attack
[portscan] tcp/3389 [MS RDP]
*(RWIN=1024)(04011029)
2020-04-01 19:25:21
198.245.49.37 attackspambots
SSH brute force attempt
2020-04-01 20:00:10
91.218.221.236 attack
Apr  1 05:45:56 tor-proxy-08 sshd\[17746\]: Invalid user pi from 91.218.221.236 port 44792
Apr  1 05:45:56 tor-proxy-08 sshd\[17747\]: Invalid user pi from 91.218.221.236 port 44794
Apr  1 05:45:56 tor-proxy-08 sshd\[17746\]: Connection closed by 91.218.221.236 port 44792 \[preauth\]
Apr  1 05:45:56 tor-proxy-08 sshd\[17747\]: Connection closed by 91.218.221.236 port 44794 \[preauth\]
...
2020-04-01 20:03:46
116.196.79.253 attack
Automatic report - SSH Brute-Force Attack
2020-04-01 19:37:04
107.170.18.163 attackspam
(sshd) Failed SSH login from 107.170.18.163 (US/United States/-): 5 in the last 3600 secs
2020-04-01 19:24:13
185.137.234.21 attackbots
Triggered: repeated knocking on closed ports.
2020-04-01 19:30:31
5.116.61.58 attack
Unauthorized connection attempt from IP address 5.116.61.58 on Port 445(SMB)
2020-04-01 20:07:25
190.111.122.147 attackbots
Unauthorized connection attempt from IP address 190.111.122.147 on Port 445(SMB)
2020-04-01 19:47:35
88.249.221.135 attackbotsspam
Unauthorized connection attempt from IP address 88.249.221.135 on Port 445(SMB)
2020-04-01 19:44:28
185.68.28.239 attackspam
SSH Brute-Forcing (server1)
2020-04-01 19:50:43
183.81.157.226 attack
Unauthorized connection attempt from IP address 183.81.157.226 on Port 445(SMB)
2020-04-01 19:39:45
123.143.203.67 attack
Apr  1 13:33:31 sso sshd[9309]: Failed password for root from 123.143.203.67 port 52198 ssh2
...
2020-04-01 20:01:53
149.56.183.202 attackbots
2020-04-01 13:32:05,266 fail2ban.actions: WARNING [ssh] Ban 149.56.183.202
2020-04-01 19:32:51
41.41.104.105 attackbots
Unauthorized connection attempt from IP address 41.41.104.105 on Port 445(SMB)
2020-04-01 19:42:06

Recently Reported IPs

112.80.48.37 112.80.41.16 112.80.245.5 112.81.169.249
112.80.87.189 112.80.240.70 112.80.247.24 112.80.229.233
112.80.243.198 112.80.41.254 112.80.6.163 112.80.208.164
112.80.231.133 112.80.237.132 112.80.149.140 112.80.197.95
112.80.153.90 112.80.142.158 112.80.225.108 112.80.161.73