Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hong Kong

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '119.13.80.0 - 119.13.87.255'

% Abuse contact for '119.13.80.0 - 119.13.87.255' is 'hwssecurity@huaweicloud.com'

inetnum:        119.13.80.0 - 119.13.87.255
netname:        Huawei-Cloud-HongKong
descr:          Huawei Cloud HongKong Region
country:        HK
admin-c:        HIPL7-AP
tech-c:         HIPL7-AP
abuse-c:        AH905-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-HIPL-SG
mnt-irt:        IRT-HIPL-SG
last-modified:  2024-08-08T09:00:28Z
geofeed:        https://res-static.hc-cdn.cn/cloudbu-site/china/zh-cn/IP-location/google-geo-feed.csv
source:         APNIC

irt:            IRT-HIPL-SG
address:        15A Changi Business Park Central 1 Eightrium
e-mail:         hwssecurity@huaweicloud.com
abuse-mailbox:  hwssecurity@huaweicloud.com
admin-c:        HIPL4-AP
tech-c:         HIPL4-AP
auth:           # Filtered
remarks:        hwssecurity@huaweicloud.com
remarks:        hwssecurity@huaweicloud.com was validated on 2025-06-30
mnt-by:         MAINT-HIPL-SG
last-modified:  2025-09-04T07:18:22Z
source:         APNIC

role:           ABUSE HIPLSG
country:        ZZ
address:        15A Changi Business Park Central 1 Eightrium # 03-03/04, Singapore 486035
phone:          +000000000
e-mail:         hwssecurity@huaweicloud.com
admin-c:        HIPL4-AP
tech-c:         HIPL4-AP
nic-hdl:        AH905-AP
remarks:        Generated from irt object IRT-HIPL-SG
remarks:        hwssecurity@huaweicloud.com was validated on 2025-06-30
abuse-mailbox:  hwssecurity@huaweicloud.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-06-30T08:15:08Z
source:         APNIC

role:           HUAWEI INTERNATIONAL PTE LTD administrator
address:        15A Changi Business Park Central 1 Eightrium #03-03/04, Singapore  486035
country:        SG
phone:          +8618730601505
e-mail:         wanggang222@huawei.com
admin-c:        HIPL7-AP
tech-c:         HIPL7-AP
nic-hdl:        HIPL7-AP
notify:         wanggang222@huawei.com
mnt-by:         MAINT-HIPL-SG
last-modified:  2021-06-04T07:42:42Z
source:         APNIC

% Information related to '119.13.80.0/24AS136907'

route:          119.13.80.0/24
country:        HK
origin:         AS136907
descr:          HUAWEI INTERNATIONAL PTE. LTD.
                15A Changi Business Park Central 1 Eightrium #03-03/04
mnt-by:         MAINT-HIPL-SG
last-modified:  2025-01-15T09:32:06Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.13.80.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21477
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.13.80.168.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 07 15:20:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
168.80.13.119.in-addr.arpa domain name pointer ecs-119-13-80-168.compute.hwclouds-dns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
168.80.13.119.in-addr.arpa	name = ecs-119-13-80-168.compute.hwclouds-dns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
132.232.23.12 attack
FTP Brute-Force reported by Fail2Ban
2019-08-11 17:10:46
14.186.46.202 attack
ssh failed login
2019-08-11 16:54:00
188.187.189.90 attackspambots
[portscan] Port scan
2019-08-11 17:14:53
94.102.51.117 attack
Trying ports that it shouldn't be.
2019-08-11 17:17:07
116.196.81.5 attackbots
SSH Brute-Force reported by Fail2Ban
2019-08-11 17:05:49
103.74.123.83 attack
Aug 11 11:20:59 microserver sshd[51354]: Invalid user arma from 103.74.123.83 port 58846
Aug 11 11:20:59 microserver sshd[51354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.123.83
Aug 11 11:21:01 microserver sshd[51354]: Failed password for invalid user arma from 103.74.123.83 port 58846 ssh2
Aug 11 11:26:17 microserver sshd[52039]: Invalid user john from 103.74.123.83 port 48730
Aug 11 11:26:17 microserver sshd[52039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.123.83
Aug 11 11:36:33 microserver sshd[53381]: Invalid user bow from 103.74.123.83 port 56906
Aug 11 11:36:33 microserver sshd[53381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.123.83
Aug 11 11:36:35 microserver sshd[53381]: Failed password for invalid user bow from 103.74.123.83 port 56906 ssh2
Aug 11 11:41:48 microserver sshd[54052]: Invalid user bs from 103.74.123.83 port 46850
Aug 11 11:41:48
2019-08-11 17:26:39
92.124.138.118 attackspam
blacklist
2019-08-11 16:49:07
36.255.135.202 attackspambots
DATE:2019-08-11 09:52:37, IP:36.255.135.202, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis)
2019-08-11 16:56:07
14.63.167.192 attack
$f2bV_matches_ltvn
2019-08-11 17:07:05
37.139.4.138 attack
Aug 11 10:31:55 yesfletchmain sshd\[28535\]: Invalid user sasi from 37.139.4.138 port 45986
Aug 11 10:31:55 yesfletchmain sshd\[28535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.4.138
Aug 11 10:31:57 yesfletchmain sshd\[28535\]: Failed password for invalid user sasi from 37.139.4.138 port 45986 ssh2
Aug 11 10:36:25 yesfletchmain sshd\[28546\]: Invalid user lixu from 37.139.4.138 port 42575
Aug 11 10:36:25 yesfletchmain sshd\[28546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.4.138
...
2019-08-11 17:42:18
50.239.140.1 attackspam
Aug 11 10:50:44 dedicated sshd[19169]: Invalid user lyle from 50.239.140.1 port 60052
2019-08-11 17:03:01
188.77.244.101 attackspambots
Automatic report - Port Scan Attack
2019-08-11 16:55:30
104.248.33.229 attack
Aug 11 09:58:22 [host] sshd[1092]: Invalid user teamspeak from 104.248.33.229
Aug 11 09:58:22 [host] sshd[1092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.33.229
Aug 11 09:58:25 [host] sshd[1092]: Failed password for invalid user teamspeak from 104.248.33.229 port 33012 ssh2
2019-08-11 16:50:21
118.25.177.241 attack
Aug 11 02:55:02 dallas01 sshd[904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.177.241
Aug 11 02:55:04 dallas01 sshd[904]: Failed password for invalid user fhem from 118.25.177.241 port 46702 ssh2
Aug 11 02:58:20 dallas01 sshd[1548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.177.241
2019-08-11 16:47:13
111.204.160.118 attackspam
Aug 11 09:33:19 mail sshd\[24162\]: Failed password for invalid user kmysclub from 111.204.160.118 port 46570 ssh2
Aug 11 09:55:40 mail sshd\[24526\]: Invalid user mwang from 111.204.160.118 port 22535
...
2019-08-11 17:08:59

Recently Reported IPs

91.231.89.206 205.210.31.167 47.83.131.112 34.21.80.133
34.21.80.111 27.204.195.39 185.247.137.175 27.43.224.139
103.114.105.4 103.141.136.203 165.154.152.173 196.251.87.141
144.126.203.251 212.129.5.242 62.210.113.151 159.89.38.87
111.226.103.156 110.241.12.158 38.220.131.112 58.44.93.207