Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.66.106.218 attack
Unauthorized connection attempt detected from IP address 112.66.106.218 to port 8080
2019-12-31 06:31:00
112.66.106.87 attack
The IP has triggered Cloudflare WAF. CF-Ray: 540f2ea2d96a9965 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.077692140 Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:18:11
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.66.106.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38742
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.66.106.148.			IN	A

;; AUTHORITY SECTION:
.			130	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 06:39:22 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 148.106.66.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.106.66.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
35.187.112.30 attackspam
Port Scan: TCP/102
2019-09-03 01:50:45
42.2.90.73 attackspambots
Port Scan: TCP/5555
2019-09-03 01:48:33
148.70.40.42 attackspambots
Port Scan: TCP/21
2019-09-03 01:00:00
89.20.36.2 attackspam
Port Scan: TCP/445
2019-09-03 01:07:57
69.147.154.42 attack
Port Scan: TCP/445
2019-09-03 01:41:42
122.118.223.50 attackbots
2323/tcp
[2019-09-02]1pkt
2019-09-03 01:32:47
182.36.185.161 attack
Port Scan: TCP/23
2019-09-03 00:53:47
185.180.14.91 attackspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-09-03 00:51:40
59.40.183.145 attack
Port Scan: TCP/1433
2019-09-03 01:15:49
92.246.150.225 attackbotsspam
445/tcp
[2019-09-02]1pkt
2019-09-03 01:05:14
161.11.225.51 attack
Port Scan: UDP/51294
2019-09-03 00:58:12
137.117.44.14 attackspam
Port Scan: TCP/445
2019-09-03 01:00:43
69.80.119.169 attackspam
Port Scan: UDP/1
2019-09-03 01:12:17
97.68.43.242 attackbotsspam
Port Scan: TCP/25
2019-09-03 01:04:49
66.193.212.113 attackspam
Port Scan: TCP/445
2019-09-03 01:12:57

Recently Reported IPs

112.66.106.140 112.66.106.156 112.66.106.198 112.66.106.240
112.66.106.243 112.66.106.210 112.66.106.81 112.66.107.142
112.66.107.104 112.66.107.168 112.66.107.222 112.66.107.179
112.66.108.218 112.66.107.194 112.66.108.22 112.66.108.80
112.66.109.110 112.66.109.192 112.66.109.21 112.66.109.74