Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '211.156.80.0 - 211.156.95.255'

% Abuse contact for '211.156.80.0 - 211.156.95.255' is 'ipas@cnnic.cn'

inetnum:        211.156.80.0 - 211.156.95.255
netname:        CNNIC
descr:          No.4, Zhongguancun No.4 South Street,
descr:          Haidian District, Beijing
descr:          P.O.Box: No.6 Branch-box of No.349 Mailbox, Beijing
country:        CN
admin-c:        MW1-AP
tech-c:         IPAS1-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNNIC-AP
mnt-irt:        IRT-CNNIC-CN
last-modified:  2023-10-09T06:49:37Z
source:         APNIC

irt:            IRT-CNNIC-CN
address:        Beijing, China
e-mail:         ipas@cnnic.cn
abuse-mailbox:  ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
auth:           # Filtered
remarks:        Please note that CNNIC is not an ISP and is not
remarks:        empowered to investigate complaints of network abuse.
remarks:        Please contact the tech-c or admin-c of the network.
remarks:        ipas@cnnic.cn is invalid
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-09-19T17:19:56Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

role:           CNNIC IPAS CONFEDERATION
address:        No.4, Zhongguancun No.4 South Street,
address:        Haidian District, Beijing
country:        CN
phone:          +86-010-58813000
fax-no:         +86-010-58813075
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        IPAS1-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2013-09-12T07:40:01Z
source:         APNIC

person:         Mao Wei
address:        China Internet Information Center(CNNIC)No. 4 of South street,
address:        Zhongguancun, Beijing, P.R.China 100080
country:        CN
phone:          +86-10-58813000
fax-no:         +86-10-62559892
e-mail:         ipas@cnnic.net.cn
nic-hdl:        MW1-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2008-09-04T07:29:40Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.156.80.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50143
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.156.80.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110500 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 05 23:31:52 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 139.80.156.211.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.80.156.211.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.153.129.217 attackbots
Feb 15 07:22:47 pkdns2 sshd\[27508\]: Failed password for root from 202.153.129.217 port 58834 ssh2Feb 15 07:23:29 pkdns2 sshd\[27541\]: Invalid user yyy from 202.153.129.217Feb 15 07:23:31 pkdns2 sshd\[27541\]: Failed password for invalid user yyy from 202.153.129.217 port 59774 ssh2Feb 15 07:24:12 pkdns2 sshd\[27569\]: Invalid user yb from 202.153.129.217Feb 15 07:24:14 pkdns2 sshd\[27569\]: Failed password for invalid user yb from 202.153.129.217 port 60712 ssh2Feb 15 07:24:57 pkdns2 sshd\[27578\]: Invalid user roydan from 202.153.129.217
...
2020-02-15 17:29:40
124.234.141.254 attackspambots
CN_APNIC-HM_<177>1581742234 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 124.234.141.254:46436
2020-02-15 17:46:29
140.143.199.89 attack
Feb 15 06:17:30 sd-53420 sshd\[23004\]: Invalid user duncan from 140.143.199.89
Feb 15 06:17:30 sd-53420 sshd\[23004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.199.89
Feb 15 06:17:31 sd-53420 sshd\[23004\]: Failed password for invalid user duncan from 140.143.199.89 port 34140 ssh2
Feb 15 06:22:14 sd-53420 sshd\[23361\]: Invalid user azzakhalel from 140.143.199.89
Feb 15 06:22:14 sd-53420 sshd\[23361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.199.89
...
2020-02-15 17:15:21
111.250.143.8 attackspambots
[portscan] tcp/23 [TELNET]
[scan/connect: 2 time(s)]
*(RWIN=19343)(02151159)
2020-02-15 17:35:10
157.230.235.233 attackbotsspam
Automatic report - Banned IP Access
2020-02-15 17:27:40
37.59.47.80 attack
Automatic report - XMLRPC Attack
2020-02-15 17:08:12
92.63.194.7 attack
SSH bruteforce
2020-02-15 17:45:29
42.235.156.188 attackspam
port scan and connect, tcp 23 (telnet)
2020-02-15 17:07:32
185.64.45.254 attack
SSH Bruteforce attack
2020-02-15 17:35:53
192.99.7.71 attack
Repeated brute force against a port
2020-02-15 17:09:35
188.226.159.111 attack
Feb 15 07:21:07 thevastnessof sshd[10016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.159.111
...
2020-02-15 17:26:18
82.80.137.83 attackbotsspam
Automatic report - Port Scan Attack
2020-02-15 17:03:02
128.199.204.164 attack
$f2bV_matches
2020-02-15 17:40:43
49.72.212.22 attackbotsspam
Feb 14 19:22:34 web1 sshd\[13822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.72.212.22  user=root
Feb 14 19:22:36 web1 sshd\[13822\]: Failed password for root from 49.72.212.22 port 48032 ssh2
Feb 14 19:26:28 web1 sshd\[14201\]: Invalid user olimex from 49.72.212.22
Feb 14 19:26:28 web1 sshd\[14201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.72.212.22
Feb 14 19:26:30 web1 sshd\[14201\]: Failed password for invalid user olimex from 49.72.212.22 port 59424 ssh2
2020-02-15 17:17:12
47.176.39.218 attackspam
SSH Bruteforce attack
2020-02-15 17:46:56

Recently Reported IPs

183.241.182.186 183.198.193.57 175.44.80.169 135.237.126.195
120.243.114.199 120.230.23.102 106.8.142.109 218.248.90.37
218.248.90.69 37.78.233.130 135.237.127.161 185.100.233.188
171.117.10.212 35.203.210.112 199.244.88.232 180.153.236.86
180.153.236.163 121.201.122.3 141.98.197.31 78.135.107.199