Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jinan

Region: Shandong

Country: China

Internet Service Provider: China Unicom Shandong Province Network

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.231.70.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25503
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;112.231.70.66.			IN	A

;; AUTHORITY SECTION:
.			456	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021901 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 04:56:54 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 66.70.231.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.70.231.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
105.225.254.204 attackbots
Honeypot attack, port: 445, PTR: 254-225-105-204.south.dsl.telkomsa.net.
2020-03-01 21:39:45
106.54.141.45 attackspam
Mar  1 07:48:31 plusreed sshd[19209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.45  user=root
Mar  1 07:48:33 plusreed sshd[19209]: Failed password for root from 106.54.141.45 port 51772 ssh2
...
2020-03-01 21:04:28
49.145.110.242 attackbotsspam
Honeypot attack, port: 445, PTR: dsl.49.145.110.242.pldt.net.
2020-03-01 21:47:10
159.89.170.20 attack
Mar  1 08:19:41 NPSTNNYC01T sshd[5589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.170.20
Mar  1 08:19:42 NPSTNNYC01T sshd[5589]: Failed password for invalid user customer from 159.89.170.20 port 36968 ssh2
Mar  1 08:26:30 NPSTNNYC01T sshd[5943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.170.20
...
2020-03-01 21:33:11
49.234.188.88 attack
2020-03-01T13:16:52.822042abusebot-4.cloudsearch.cf sshd[15459]: Invalid user backup from 49.234.188.88 port 31543
2020-03-01T13:16:52.827278abusebot-4.cloudsearch.cf sshd[15459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.188.88
2020-03-01T13:16:52.822042abusebot-4.cloudsearch.cf sshd[15459]: Invalid user backup from 49.234.188.88 port 31543
2020-03-01T13:16:55.137595abusebot-4.cloudsearch.cf sshd[15459]: Failed password for invalid user backup from 49.234.188.88 port 31543 ssh2
2020-03-01T13:26:30.478771abusebot-4.cloudsearch.cf sshd[15949]: Invalid user Michelle from 49.234.188.88 port 24993
2020-03-01T13:26:30.485095abusebot-4.cloudsearch.cf sshd[15949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.188.88
2020-03-01T13:26:30.478771abusebot-4.cloudsearch.cf sshd[15949]: Invalid user Michelle from 49.234.188.88 port 24993
2020-03-01T13:26:32.143244abusebot-4.cloudsearch.cf sshd[15949
...
2020-03-01 21:31:26
185.175.93.101 attackspam
Mar  1 14:26:21 debian-2gb-nbg1-2 kernel: \[5328367.851885\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.101 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=21702 PROTO=TCP SPT=58279 DPT=5905 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-01 21:39:28
45.125.65.35 attackspambots
Mar  1 14:01:56 v22019058497090703 postfix/smtpd[9548]: warning: unknown[45.125.65.35]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  1 14:06:15 v22019058497090703 postfix/smtpd[9990]: warning: unknown[45.125.65.35]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  1 14:06:47 v22019058497090703 postfix/smtpd[10137]: warning: unknown[45.125.65.35]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-01 21:09:03
68.183.12.80 attack
Mar  1 11:31:35 server sshd\[11459\]: Invalid user centos from 68.183.12.80
Mar  1 11:31:35 server sshd\[11459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=chbluxury.com.ng 
Mar  1 11:31:37 server sshd\[11459\]: Failed password for invalid user centos from 68.183.12.80 port 40218 ssh2
Mar  1 11:33:22 server sshd\[11633\]: Invalid user centos from 68.183.12.80
Mar  1 11:33:22 server sshd\[11633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=chbluxury.com.ng 
...
2020-03-01 21:11:39
198.71.239.42 attackbotsspam
Automatic report - XMLRPC Attack
2020-03-01 21:17:48
91.121.211.34 attackbotsspam
Mar  1 14:07:54 vps647732 sshd[20671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.34
Mar  1 14:07:57 vps647732 sshd[20671]: Failed password for invalid user bruno from 91.121.211.34 port 44932 ssh2
...
2020-03-01 21:15:32
178.48.85.29 attackspambots
Mar  1 14:26:20 MK-Soft-VM3 sshd[23653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.48.85.29 
Mar  1 14:26:22 MK-Soft-VM3 sshd[23653]: Failed password for invalid user ag from 178.48.85.29 port 57388 ssh2
...
2020-03-01 21:40:37
171.67.71.243 attackbotsspam
Unauthorized connection attempt detected from IP address 171.67.71.243 to port 80 [J]
2020-03-01 21:46:28
78.131.56.62 attack
frenzy
2020-03-01 21:14:51
124.113.218.41 attack
Mar  1 14:26:30 grey postfix/smtpd\[25263\]: NOQUEUE: reject: RCPT from unknown\[124.113.218.41\]: 554 5.7.1 Service unavailable\; Client host \[124.113.218.41\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[124.113.218.41\]\; from=\ to=\ proto=SMTP helo=\
...
2020-03-01 21:32:16
181.49.107.180 attackspambots
$f2bV_matches_ltvn
2020-03-01 21:30:07

Recently Reported IPs

115.43.0.13 99.241.207.83 73.59.79.220 179.57.170.207
191.164.134.197 128.146.215.91 180.183.155.97 39.247.163.241
200.223.169.130 184.112.118.64 178.176.215.88 200.155.87.118
218.7.46.91 192.186.128.2 168.255.233.48 124.177.90.36
14.189.95.63 104.254.21.246 122.247.177.159 194.65.46.26