Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.66.104.41 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5410875db8eeeb29 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/4.054101423 Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:36:01
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.66.104.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11903
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.66.104.168.			IN	A

;; AUTHORITY SECTION:
.			421	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 233 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:04:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 168.104.66.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.104.66.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.0.125.219 attackspam
email spam
2019-11-05 21:17:04
62.73.127.10 attack
email spam
2019-11-05 21:30:34
178.20.137.178 attackspam
SPF Fail sender not permitted to send mail for @avonet.cz / Sent mail to target address hacked/leaked from abandonia in 2016
2019-11-05 21:15:14
109.87.78.144 attackspam
postfix (unknown user, SPF fail or relay access denied)
2019-11-05 21:23:07
200.46.103.162 attackbotsspam
Unauthorized connection attempt from IP address 200.46.103.162 on Port 25(SMTP)
2019-11-05 21:43:21
117.4.145.16 attack
email spam
2019-11-05 21:20:49
45.166.186.239 attack
postfix
2019-11-05 21:32:44
213.129.99.10 attack
email spam
2019-11-05 21:06:57
46.219.104.160 attack
email spam
2019-11-05 21:32:01
50.240.188.72 attack
email spam
2019-11-05 21:31:35
181.57.98.228 attack
email spam
2019-11-05 21:14:00
200.52.144.170 attackbots
SpamReport
2019-11-05 21:42:56
217.29.18.206 attackspam
Brute force attempt
2019-11-05 21:37:09
217.72.1.254 attackspambots
email spam
2019-11-05 21:06:43
94.247.241.70 attack
proto=tcp  .  spt=56994  .  dpt=25  .     (Listed on    dnsbl-sorbs plus abuseat-org and barracuda)     (313)
2019-11-05 21:27:31

Recently Reported IPs

112.66.103.32 112.66.103.135 112.66.104.190 112.66.104.120
112.66.104.27 112.66.104.214 112.66.105.123 112.66.104.96
112.66.104.140 112.66.104.58 112.66.104.6 112.66.105.144
112.66.104.43 112.66.105.232 112.66.105.211 112.66.105.136
112.66.106.11 112.66.106.180 112.66.105.36 112.66.106.224