Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.66.104.41 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5410875db8eeeb29 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/4.054101423 Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:36:01
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.66.104.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.66.104.82.			IN	A

;; AUTHORITY SECTION:
.			221	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:32:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 82.104.66.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.104.66.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.237.82.108 attackspambots
Honeypot attack, port: 5555, PTR: n11923782108.netvigator.com.
2020-04-12 23:01:55
94.245.20.160 attackspambots
Unauthorized connection attempt detected from IP address 94.245.20.160 to port 23
2020-04-12 23:23:07
211.206.189.122 attackbotsspam
Unauthorized connection attempt detected from IP address 211.206.189.122 to port 23
2020-04-12 23:11:48
189.142.163.141 attack
Unauthorized connection attempt detected from IP address 189.142.163.141 to port 88
2020-04-12 23:15:05
12.36.54.66 attack
1586698874 - 04/12/2020 15:41:14 Host: 12.36.54.66/12.36.54.66 Port: 8080 TCP Blocked
2020-04-12 23:28:09
118.233.195.90 attackspam
Honeypot attack, port: 5555, PTR: 118-233-195-90.dynamic.kbronet.com.tw.
2020-04-12 23:18:01
95.170.222.226 attackspam
Unauthorized connection attempt detected from IP address 95.170.222.226 to port 80
2020-04-12 23:21:50
115.22.99.140 attackbots
Unauthorized connection attempt detected from IP address 115.22.99.140 to port 5555
2020-04-12 23:19:03
183.89.214.179 attack
(eximsyntax) Exim syntax errors from 183.89.214.179 (TH/Thailand/mx-ll-183.89.214-179.dynamic.3bb.in.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-12 18:04:53 SMTP call from [183.89.214.179] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-04-12 23:07:50
210.179.34.118 attack
Unauthorized connection attempt detected from IP address 210.179.34.118 to port 842
2020-04-12 23:12:08
111.229.168.229 attackspam
SSH Brute-Force Attack
2020-04-12 23:00:37
222.96.108.229 attack
Unauthorized connection attempt detected from IP address 222.96.108.229 to port 23
2020-04-12 23:11:23
104.244.226.57 attackbots
Unauthorized connection attempt detected from IP address 104.244.226.57 to port 445
2020-04-12 23:19:46
190.3.111.10 attackspambots
Unauthorized connection attempt detected from IP address 190.3.111.10 to port 8089
2020-04-12 23:40:39
50.208.29.222 attackspam
" "
2020-04-12 23:26:16

Recently Reported IPs

112.66.105.139 112.66.105.160 112.66.105.154 112.66.105.164
112.66.104.22 112.66.105.193 112.66.105.227 112.66.105.218
112.66.105.176 112.66.105.239 112.66.105.30 112.66.105.248
112.66.105.242 112.66.105.62 112.66.105.81 112.66.105.33
112.66.105.65 112.66.105.83 112.66.105.252 112.66.105.180