Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.66.99.6 attackspam
Unauthorized connection attempt detected from IP address 112.66.99.6 to port 8000 [J]
2020-01-27 15:15:57
112.66.99.159 attackspam
Unauthorized connection attempt detected from IP address 112.66.99.159 to port 802 [T]
2020-01-10 09:23:22
112.66.99.167 attackspam
Unauthorized connection attempt detected from IP address 112.66.99.167 to port 8899
2020-01-04 08:33:51
112.66.99.25 attackspambots
Unauthorized connection attempt detected from IP address 112.66.99.25 to port 8090
2020-01-01 21:33:22
112.66.99.1 attackspambots
Unauthorized connection attempt detected from IP address 112.66.99.1 to port 2095
2019-12-31 08:33:07
112.66.99.6 attackbotsspam
Unauthorized connection attempt detected from IP address 112.66.99.6 to port 3128
2019-12-31 07:42:24
112.66.99.211 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5430c47bb86fe825 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.064213590 Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 06:48:59
112.66.99.155 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 540f7b87ae62e4fe | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.064213590 Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:35:16
112.66.99.74 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5414bd353ee5eb45 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.066704189 Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:09:41
112.66.99.63 attack
The%20IP%20has%20triggered%20Cloudflare%20WAF.%20Report%20generated%20by%20Cloudflare-WAF-to-AbuseIPDB%20(https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB)
2019-11-19 04:18:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.66.99.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23335
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.66.99.41.			IN	A

;; AUTHORITY SECTION:
.			144	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:36:49 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 41.99.66.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.99.66.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.11.176.157 attackspam
Aug 13 20:21:52 mxgate1 postfix/postscreen[31741]: CONNECT from [92.11.176.157]:34972 to [176.31.12.44]:25
Aug 13 20:21:52 mxgate1 postfix/dnsblog[31742]: addr 92.11.176.157 listed by domain zen.spamhaus.org as 127.0.0.10
Aug 13 20:21:52 mxgate1 postfix/dnsblog[31742]: addr 92.11.176.157 listed by domain zen.spamhaus.org as 127.0.0.4
Aug 13 20:21:53 mxgate1 postfix/dnsblog[31778]: addr 92.11.176.157 listed by domain cbl.abuseat.org as 127.0.0.2
Aug 13 20:21:53 mxgate1 postfix/dnsblog[31745]: addr 92.11.176.157 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Aug 13 20:21:53 mxgate1 postfix/dnsblog[31744]: addr 92.11.176.157 listed by domain b.barracudacentral.org as 127.0.0.2
Aug 13 20:21:58 mxgate1 postfix/postscreen[31741]: DNSBL rank 5 for [92.11.176.157]:34972
Aug x@x
Aug 13 20:21:58 mxgate1 postfix/postscreen[31741]: HANGUP after 0.08 from [92.11.176.157]:34972 in tests after SMTP handshake
Aug 13 20:21:58 mxgate1 postfix/postscreen[31741]: DISCONNECT [92.11.176.1........
-------------------------------
2019-08-14 04:24:55
188.252.197.123 attackbotsspam
SS5,WP GET /wp-login.php
2019-08-14 03:57:35
50.64.152.76 attackbots
Aug 13 20:27:10 plex sshd[10655]: Invalid user carla from 50.64.152.76 port 60040
2019-08-14 03:52:50
158.69.192.239 attackspam
Aug 13 20:26:21 mail sshd\[11728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.239  user=root
Aug 13 20:26:23 mail sshd\[11728\]: Failed password for root from 158.69.192.239 port 52422 ssh2
Aug 13 20:26:26 mail sshd\[11728\]: Failed password for root from 158.69.192.239 port 52422 ssh2
Aug 13 20:26:28 mail sshd\[11728\]: Failed password for root from 158.69.192.239 port 52422 ssh2
Aug 13 20:26:31 mail sshd\[11728\]: Failed password for root from 158.69.192.239 port 52422 ssh2
2019-08-14 04:31:25
137.74.25.247 attackspam
2019-08-13T18:34:08.154588abusebot.cloudsearch.cf sshd\[6364\]: Invalid user master from 137.74.25.247 port 41207
2019-08-14 04:12:11
51.68.123.37 attackbotsspam
Aug 13 21:28:50 nextcloud sshd\[2224\]: Invalid user sc from 51.68.123.37
Aug 13 21:28:50 nextcloud sshd\[2224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.37
Aug 13 21:28:52 nextcloud sshd\[2224\]: Failed password for invalid user sc from 51.68.123.37 port 55892 ssh2
...
2019-08-14 04:23:21
119.205.220.98 attack
Aug 13 20:38:46 root sshd[5628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.205.220.98 
Aug 13 20:38:48 root sshd[5628]: Failed password for invalid user craig from 119.205.220.98 port 55200 ssh2
Aug 13 20:47:45 root sshd[5732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.205.220.98 
...
2019-08-14 04:06:06
165.22.101.189 attackspambots
Aug 13 21:51:41 mout sshd[4009]: Invalid user marlon from 165.22.101.189 port 50806
2019-08-14 03:59:32
51.68.229.59 attack
Aug 13 21:45:26 microserver sshd[8193]: Invalid user denys from 51.68.229.59 port 42084
Aug 13 21:45:26 microserver sshd[8193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.229.59
Aug 13 21:45:28 microserver sshd[8193]: Failed password for invalid user denys from 51.68.229.59 port 42084 ssh2
Aug 13 21:50:44 microserver sshd[8907]: Invalid user support from 51.68.229.59 port 41998
Aug 13 21:50:45 microserver sshd[8907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.229.59
Aug 13 22:03:54 microserver sshd[10466]: Invalid user compsx from 51.68.229.59 port 51602
Aug 13 22:03:54 microserver sshd[10466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.229.59
Aug 13 22:03:56 microserver sshd[10466]: Failed password for invalid user compsx from 51.68.229.59 port 51602 ssh2
Aug 13 22:08:31 microserver sshd[11129]: Invalid user ain from 51.68.229.59 port 45388
Aug 13 22:08:31 m
2019-08-14 04:11:40
188.120.241.106 attackspambots
Aug 12 20:54:30 eola sshd[21829]: Invalid user cai from 188.120.241.106 port 33158
Aug 12 20:54:30 eola sshd[21829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.120.241.106 
Aug 12 20:54:32 eola sshd[21829]: Failed password for invalid user cai from 188.120.241.106 port 33158 ssh2
Aug 12 20:54:32 eola sshd[21829]: Received disconnect from 188.120.241.106 port 33158:11: Bye Bye [preauth]
Aug 12 20:54:32 eola sshd[21829]: Disconnected from 188.120.241.106 port 33158 [preauth]
Aug 12 21:00:43 eola sshd[22456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.120.241.106  user=messagebus
Aug 12 21:00:45 eola sshd[22456]: Failed password for messagebus from 188.120.241.106 port 50904 ssh2
Aug 12 21:00:45 eola sshd[22456]: Received disconnect from 188.120.241.106 port 50904:11: Bye Bye [preauth]
Aug 12 21:00:45 eola sshd[22456]: Disconnected from 188.120.241.106 port 50904 [preauth]


........
--------------------------------
2019-08-14 04:05:48
139.99.201.100 attackspam
Aug 13 22:36:42 www2 sshd\[3997\]: Invalid user admin from 139.99.201.100Aug 13 22:36:44 www2 sshd\[3997\]: Failed password for invalid user admin from 139.99.201.100 port 39796 ssh2Aug 13 22:42:30 www2 sshd\[4650\]: Invalid user tss3 from 139.99.201.100
...
2019-08-14 03:51:34
54.38.156.181 attackspambots
Aug 13 22:20:59 SilenceServices sshd[20741]: Failed password for root from 54.38.156.181 port 54688 ssh2
Aug 13 22:26:57 SilenceServices sshd[24405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.156.181
Aug 13 22:26:59 SilenceServices sshd[24405]: Failed password for invalid user linda from 54.38.156.181 port 47580 ssh2
2019-08-14 04:28:11
115.231.73.154 attackspam
Aug 13 21:34:45 mail sshd\[22981\]: Failed password for invalid user joanna from 115.231.73.154 port 59739 ssh2
Aug 13 21:38:34 mail sshd\[23410\]: Invalid user user from 115.231.73.154 port 51230
Aug 13 21:38:34 mail sshd\[23410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.73.154
Aug 13 21:38:35 mail sshd\[23410\]: Failed password for invalid user user from 115.231.73.154 port 51230 ssh2
Aug 13 21:42:18 mail sshd\[24055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.73.154  user=root
2019-08-14 03:56:09
117.204.61.215 attackbots
Automatic report - Port Scan Attack
2019-08-14 04:01:01
2.233.129.191 attackbots
port scan and connect, tcp 80 (http)
2019-08-14 04:27:07

Recently Reported IPs

112.66.243.128 112.66.247.99 112.67.187.143 112.74.98.13
112.78.1.220 112.78.1.239 112.78.11.10 112.78.112.43
112.78.11.11 112.78.117.105 112.78.117.172 112.66.97.191
112.78.125.31 112.78.143.22 112.78.2.104 112.78.2.146
112.78.2.14 112.78.2.112 112.78.2.26 112.78.2.163