Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.66.99.6 attackspam
Unauthorized connection attempt detected from IP address 112.66.99.6 to port 8000 [J]
2020-01-27 15:15:57
112.66.99.159 attackspam
Unauthorized connection attempt detected from IP address 112.66.99.159 to port 802 [T]
2020-01-10 09:23:22
112.66.99.167 attackspam
Unauthorized connection attempt detected from IP address 112.66.99.167 to port 8899
2020-01-04 08:33:51
112.66.99.25 attackspambots
Unauthorized connection attempt detected from IP address 112.66.99.25 to port 8090
2020-01-01 21:33:22
112.66.99.1 attackspambots
Unauthorized connection attempt detected from IP address 112.66.99.1 to port 2095
2019-12-31 08:33:07
112.66.99.6 attackbotsspam
Unauthorized connection attempt detected from IP address 112.66.99.6 to port 3128
2019-12-31 07:42:24
112.66.99.211 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5430c47bb86fe825 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.064213590 Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 06:48:59
112.66.99.155 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 540f7b87ae62e4fe | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.064213590 Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:35:16
112.66.99.74 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5414bd353ee5eb45 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.066704189 Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:09:41
112.66.99.63 attack
The%20IP%20has%20triggered%20Cloudflare%20WAF.%20Report%20generated%20by%20Cloudflare-WAF-to-AbuseIPDB%20(https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB)
2019-11-19 04:18:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.66.99.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.66.99.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 15:51:24 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 239.99.66.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.99.66.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.56.115.202 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-11-21 07:29:33
213.171.226.183 attackbotsspam
Automatic report - Port Scan Attack
2019-11-21 07:25:49
179.184.217.83 attackbotsspam
Nov 20 13:25:24 kapalua sshd\[28070\]: Invalid user jeff from 179.184.217.83
Nov 20 13:25:24 kapalua sshd\[28070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.217.83
Nov 20 13:25:26 kapalua sshd\[28070\]: Failed password for invalid user jeff from 179.184.217.83 port 45118 ssh2
Nov 20 13:29:55 kapalua sshd\[28422\]: Invalid user ident from 179.184.217.83
Nov 20 13:29:55 kapalua sshd\[28422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.217.83
2019-11-21 07:39:08
80.111.145.136 attack
CloudCIX Reconnaissance Scan Detected, PTR: cm-80.111.145.136.ntlworld.ie.
2019-11-21 07:26:48
120.224.101.134 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-21 07:06:58
5.15.128.53 attack
scan z
2019-11-21 07:34:34
45.82.153.42 attackbotsspam
45.82.153.42 was recorded 81 times by 32 hosts attempting to connect to the following ports: 2804,4706,6805,2808,6803,4708,2809,4704,6809,4703,6808,2805,6807,2810,6804,2812,2807,2811,2806,6806,4705,4709,4707,1239,1539,2126,2116,1639,2156,2136,2146,1339. Incident counter (4h, 24h, all-time): 81, 505, 5161
2019-11-21 07:15:03
129.211.76.101 attackbotsspam
Nov 20 12:50:32 sachi sshd\[4788\]: Invalid user remote from 129.211.76.101
Nov 20 12:50:32 sachi sshd\[4788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.76.101
Nov 20 12:50:33 sachi sshd\[4788\]: Failed password for invalid user remote from 129.211.76.101 port 37376 ssh2
Nov 20 12:54:39 sachi sshd\[5071\]: Invalid user aaaaaaaa from 129.211.76.101
Nov 20 12:54:39 sachi sshd\[5071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.76.101
2019-11-21 07:02:38
217.7.251.206 attackbots
Nov 21 01:28:47 server sshd\[27530\]: Invalid user pcap from 217.7.251.206
Nov 21 01:28:47 server sshd\[27530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pd907fbce.dip0.t-ipconnect.de 
Nov 21 01:28:49 server sshd\[27530\]: Failed password for invalid user pcap from 217.7.251.206 port 55494 ssh2
Nov 21 01:37:52 server sshd\[30061\]: Invalid user makila from 217.7.251.206
Nov 21 01:37:52 server sshd\[30061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pd907fbce.dip0.t-ipconnect.de 
...
2019-11-21 07:23:49
96.78.175.36 attack
Invalid user ftpuser from 96.78.175.36 port 56111
2019-11-21 07:32:10
118.24.173.104 attackbotsspam
Invalid user openzj from 118.24.173.104 port 52585
2019-11-21 07:20:39
183.81.45.117 attack
port scan and connect, tcp 23 (telnet)
2019-11-21 07:17:18
45.234.109.34 attackspambots
Honeypot attack, port: 23, PTR: din-45-234-109-34.connectnetbrasil.com.br.
2019-11-21 06:59:57
194.61.26.34 attackspambots
Nov 20 17:34:19 host sshd\[9162\]: Invalid user guesthouse from 194.61.26.34Nov 20 17:36:20 host sshd\[10449\]: Invalid user admin from 194.61.26.34Nov 20 17:38:17 host sshd\[10449\]: error: PAM: Authentication failure for illegal user admin from 194.61.26.34Nov 20 17:38:17 host sshd\[10449\]: Failed keyboard-interactive/pam for invalid user admin from 194.61.26.34 port 32920 ssh2Nov 20 17:38:18 host sshd\[11933\]: Invalid user as from 194.61.26.34
...
2019-11-21 07:03:45
45.136.108.85 attackbots
Invalid user 0 from 45.136.108.85 port 54553
2019-11-21 07:03:25

Recently Reported IPs

112.66.99.160 112.69.139.205 112.72.241.161 112.72.98.140
117.95.41.101 117.95.41.111 117.95.41.112 117.95.40.5
117.95.41.100 117.95.41.134 117.95.40.36 117.95.41.125
117.95.41.129 117.95.40.32 117.95.41.132 117.95.40.244
112.74.189.187 117.95.41.141 117.95.41.155 117.95.41.159