Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.20.109.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.20.109.80.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:39:02 CST 2022
;; MSG SIZE  rcvd: 106
Host info
80.109.20.113.in-addr.arpa domain name pointer static.cmcti.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.109.20.113.in-addr.arpa	name = static.cmcti.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
13.82.186.251 attackbotsspam
Dec 27 08:18:46 master sshd[4361]: Failed password for invalid user morgengold from 13.82.186.251 port 37980 ssh2
2019-12-27 19:55:44
122.51.240.241 attack
Dec 27 09:51:47 [host] sshd[9857]: Invalid user ac from 122.51.240.241
Dec 27 09:51:47 [host] sshd[9857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.240.241
Dec 27 09:51:49 [host] sshd[9857]: Failed password for invalid user ac from 122.51.240.241 port 44862 ssh2
2019-12-27 20:06:35
68.183.155.33 attackbotsspam
Invalid user server from 68.183.155.33 port 42244
2019-12-27 20:11:12
190.61.45.234 attackbots
1577427771 - 12/27/2019 07:22:51 Host: 190.61.45.234/190.61.45.234 Port: 445 TCP Blocked
2019-12-27 20:26:53
13.75.69.108 attackbotsspam
Invalid user agneto from 13.75.69.108 port 34496
2019-12-27 19:49:16
219.138.156.233 attackspambots
Dec 27 07:22:44 ArkNodeAT sshd\[32365\]: Invalid user gdm from 219.138.156.233
Dec 27 07:22:44 ArkNodeAT sshd\[32365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.138.156.233
Dec 27 07:22:46 ArkNodeAT sshd\[32365\]: Failed password for invalid user gdm from 219.138.156.233 port 41761 ssh2
2019-12-27 20:28:54
195.244.209.112 attackspam
Brute forcing RDP port 3389
2019-12-27 20:16:25
71.6.232.7 attackbots
27.12.2019 07:39:03 Recursive DNS scan
2019-12-27 20:21:47
195.244.210.25 attackspam
Brute forcing RDP port 3389
2019-12-27 20:15:56
210.96.47.245 attackbots
Fail2Ban - FTP Abuse Attempt
2019-12-27 20:25:13
45.221.78.38 attackspambots
Dec 27 10:27:33 debian-2gb-nbg1-2 kernel: \[1091577.907651\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.221.78.38 DST=195.201.40.59 LEN=53 TOS=0x00 PREC=0x00 TTL=45 ID=30565 PROTO=UDP SPT=55011 DPT=27015 LEN=33
2019-12-27 20:03:37
93.39.116.254 attackbotsspam
Invalid user weiping from 93.39.116.254 port 57935
2019-12-27 19:53:43
122.236.239.202 attackbots
FTP/21 MH Probe, BF, Hack -
2019-12-27 19:58:17
113.183.19.216 attackspambots
Dec 27 07:23:21 vpn01 sshd[9963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.183.19.216
Dec 27 07:23:24 vpn01 sshd[9963]: Failed password for invalid user admin from 113.183.19.216 port 54383 ssh2
...
2019-12-27 20:04:47
59.92.180.223 attackbots
3306/tcp
[2019-12-27]1pkt
2019-12-27 20:09:20

Recently Reported IPs

113.195.33.192 113.197.187.205 113.20.109.47 113.195.104.171
113.199.243.173 113.200.48.111 113.20.109.66 113.200.42.182
113.20.99.182 113.200.190.169 113.200.58.252 113.200.72.198
113.200.77.136 113.200.71.104 113.203.4.219 113.204.132.186
113.201.94.173 113.203.60.175 113.204.33.162 113.206.129.119