Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yokohama

Region: Kanagawa

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.28.81.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;180.28.81.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121902 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 20 06:02:21 CST 2025
;; MSG SIZE  rcvd: 105
Host info
12.81.28.180.in-addr.arpa domain name pointer p3911012-ipxg22501hodogaya.kanagawa.ocn.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.81.28.180.in-addr.arpa	name = p3911012-ipxg22501hodogaya.kanagawa.ocn.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.206.9.241 attackspam
Attempted connection to port 22.
2020-04-01 18:20:08
119.29.65.240 attackbots
Invalid user mdv from 119.29.65.240 port 33830
2020-04-01 17:40:17
142.93.114.214 attack
2020-04-01T05:03:51Z - RDP login failed multiple times. (142.93.114.214)
2020-04-01 17:44:17
192.144.157.33 attackbots
Apr  1 05:44:44 ks10 sshd[1844205]: Failed password for root from 192.144.157.33 port 49422 ssh2
Apr  1 05:48:39 ks10 sshd[1844820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.157.33 
...
2020-04-01 18:04:00
177.44.168.146 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-04-01 17:52:17
87.249.164.79 attackspambots
Invalid user kul from 87.249.164.79 port 58336
2020-04-01 17:58:36
103.129.223.101 attack
2020-04-01T11:41:36.502610  sshd[2436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.101  user=root
2020-04-01T11:41:38.009706  sshd[2436]: Failed password for root from 103.129.223.101 port 55102 ssh2
2020-04-01T11:46:05.515380  sshd[2524]: Invalid user test from 103.129.223.101 port 38250
...
2020-04-01 17:48:21
84.236.225.181 attackbotsspam
From CCTV User Interface Log
...::ffff:84.236.225.181 - - [31/Mar/2020:23:48:46 +0000] "GET / HTTP/1.1" 200 960
...
2020-04-01 18:01:53
49.247.131.96 attackbots
Apr  1 12:05:32 vps647732 sshd[10104]: Failed password for root from 49.247.131.96 port 49288 ssh2
...
2020-04-01 18:16:01
196.251.61.227 attackbotsspam
Apr  1 08:03:25 [host] sshd[9663]: pam_unix(sshd:a
Apr  1 08:03:27 [host] sshd[9663]: Failed password
Apr  1 08:09:11 [host] sshd[10129]: pam_unix(sshd:
2020-04-01 17:59:49
94.102.49.137 attackbots
firewall-block, port(s): 44442/tcp
2020-04-01 18:22:31
103.195.5.51 attack
Mar 31 04:54:00 Tower sshd[31940]: refused connect from 106.13.181.170 (106.13.181.170)
Apr  1 03:25:14 Tower sshd[31940]: Connection from 103.195.5.51 port 48480 on 192.168.10.220 port 22 rdomain ""
Apr  1 03:25:15 Tower sshd[31940]: Failed password for root from 103.195.5.51 port 48480 ssh2
Apr  1 03:25:15 Tower sshd[31940]: Received disconnect from 103.195.5.51 port 48480:11: Bye Bye [preauth]
Apr  1 03:25:15 Tower sshd[31940]: Disconnected from authenticating user root 103.195.5.51 port 48480 [preauth]
2020-04-01 17:45:12
50.62.177.112 attackspambots
Attempt to hack Wordpress Login, XMLRPC or other login
2020-04-01 17:56:23
112.85.42.229 attackbotsspam
k+ssh-bruteforce
2020-04-01 18:10:59
77.75.76.163 attackspam
20 attempts against mh-misbehave-ban on wave
2020-04-01 17:54:07

Recently Reported IPs

64.183.244.114 18.100.147.165 161.40.93.2 233.34.69.94
127.167.12.91 199.183.148.148 63.21.149.67 248.205.41.15
244.195.57.123 160.28.190.224 116.188.216.128 213.146.28.10
94.223.224.55 220.36.66.79 51.173.57.203 45.139.98.65
159.227.185.193 150.197.77.234 73.97.207.135 8.177.34.107