Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.66.100.202 attack
Unauthorized connection attempt detected from IP address 112.66.100.202 to port 8080 [T]
2020-05-06 07:47:04
112.66.100.242 attack
Unauthorized connection attempt detected from IP address 112.66.100.242 to port 8080 [T]
2020-01-10 08:57:12
112.66.100.49 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 5413735e0f7eeb59 | WAF_Rule_ID: 1112824 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.0 (Linux; U; Android 4.3; en-us; SM-N900T Build/JSS15J) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 00:41:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.66.100.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21066
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.66.100.20.			IN	A

;; AUTHORITY SECTION:
.			244	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 06:06:30 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 20.100.66.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.100.66.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.91.185.78 attack
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(01171320)
2020-01-17 19:46:39
121.149.251.163 attack
Unauthorized connection attempt detected from IP address 121.149.251.163 to port 23 [J]
2020-01-17 19:44:31
82.247.200.185 attackbotsspam
Jan 16 22:54:00 eddieflores sshd\[32138\]: Invalid user pi from 82.247.200.185
Jan 16 22:54:00 eddieflores sshd\[32139\]: Invalid user pi from 82.247.200.185
Jan 16 22:54:00 eddieflores sshd\[32138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cha86-1-82-247-200-185.fbx.proxad.net
Jan 16 22:54:00 eddieflores sshd\[32139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cha86-1-82-247-200-185.fbx.proxad.net
Jan 16 22:54:01 eddieflores sshd\[32139\]: Failed password for invalid user pi from 82.247.200.185 port 33686 ssh2
Jan 16 22:54:01 eddieflores sshd\[32138\]: Failed password for invalid user pi from 82.247.200.185 port 33678 ssh2
2020-01-17 19:28:49
77.244.209.4 attack
Unauthorized connection attempt detected from IP address 77.244.209.4 to port 2220 [J]
2020-01-17 19:49:31
156.213.96.132 attackspam
unauthorized connection attempt
2020-01-17 19:21:07
41.250.147.251 attack
unauthorized connection attempt
2020-01-17 19:34:18
47.197.193.9 attackspam
Unauthorized connection attempt detected from IP address 47.197.193.9 to port 8000 [J]
2020-01-17 19:33:19
201.53.199.117 attackspam
Unauthorized connection attempt detected from IP address 201.53.199.117 to port 23 [J]
2020-01-17 19:16:18
177.43.63.188 attack
Unauthorized connection attempt detected from IP address 177.43.63.188 to port 82 [J]
2020-01-17 19:42:47
2.236.209.242 attackspam
unauthorized connection attempt
2020-01-17 19:15:07
37.6.173.69 attack
unauthorized connection attempt
2020-01-17 19:51:25
116.58.227.29 attackspambots
unauthorized connection attempt
2020-01-17 19:23:32
40.77.167.9 attackbots
Joomla User : try to access forms...
2020-01-17 19:34:37
165.227.89.212 attackspambots
165.227.89.212 - - \[17/Jan/2020:10:27:51 +0100\] "POST /wp-login.php HTTP/1.0" 200 6699 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
165.227.89.212 - - \[17/Jan/2020:10:27:57 +0100\] "POST /wp-login.php HTTP/1.0" 200 6499 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
165.227.89.212 - - \[17/Jan/2020:10:28:04 +0100\] "POST /wp-login.php HTTP/1.0" 200 6515 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-17 19:20:51
190.147.156.229 attack
Unauthorized connection attempt detected from IP address 190.147.156.229 to port 81 [J]
2020-01-17 19:17:49

Recently Reported IPs

180.232.117.2 91.231.242.34 185.106.130.132 222.139.255.66
194.158.72.82 187.119.229.70 111.60.195.86 186.214.30.199
190.18.177.253 122.239.187.170 181.196.2.61 120.85.118.189
195.32.127.174 185.44.69.214 51.81.103.3 89.233.155.167
112.74.88.54 27.43.204.108 14.169.129.85 162.213.248.108