Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
117.66.142.252 attackbots
Unauthorized connection attempt detected from IP address 117.66.142.252 to port 6656 [T]
2020-01-27 04:47:54
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.66.142.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.66.142.72.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 01:21:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 72.142.66.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 72.142.66.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.77.242.176 attackspambots
Automatic report generated by Wazuh
2019-06-30 11:26:06
187.86.200.34 attackspambots
19/6/29@14:48:19: FAIL: Alarm-Intrusion address from=187.86.200.34
...
2019-06-30 11:10:39
212.156.115.95 attackbotsspam
Unauthorised access (Jun 29) SRC=212.156.115.95 LEN=40 TTL=239 ID=6748 TCP DPT=445 WINDOW=1024 SYN 
Unauthorised access (Jun 25) SRC=212.156.115.95 LEN=40 TTL=239 ID=5576 TCP DPT=445 WINDOW=1024 SYN
2019-06-30 11:12:21
191.100.26.142 attack
$f2bV_matches
2019-06-30 11:10:12
159.192.107.238 attackbotsspam
k+ssh-bruteforce
2019-06-30 11:14:01
189.173.149.121 attack
Honeypot attack, port: 23, PTR: dsl-189-173-149-121-dyn.prod-infinitum.com.mx.
2019-06-30 11:48:22
206.189.222.38 attackbotsspam
[ssh] SSH attack
2019-06-30 11:25:11
5.196.201.99 attack
Port scan: Attack repeated for 24 hours
2019-06-30 11:40:02
202.29.70.46 attackbots
2019-06-29T18:46:34.661429Z 0057d11129e5 New connection: 202.29.70.46:50118 (172.17.0.4:2222) [session: 0057d11129e5]
2019-06-29T18:46:50.869745Z 45b181e92b7d New connection: 202.29.70.46:45264 (172.17.0.4:2222) [session: 45b181e92b7d]
2019-06-30 11:47:55
120.92.94.111 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-06-30 11:44:53
123.103.52.9 attackbots
*Port Scan* detected from 123.103.52.9 (CN/China/123.103.52.9-BJ-CNC). 4 hits in the last 35 seconds
2019-06-30 11:22:38
157.230.128.181 attackspambots
29.06.2019 18:48:19 SSH access blocked by firewall
2019-06-30 11:11:41
46.209.45.58 attackspam
2019-06-29T18:48:12.879067abusebot-8.cloudsearch.cf sshd\[31867\]: Invalid user gerald from 46.209.45.58 port 44324
2019-06-30 11:13:09
115.187.45.72 attackspambots
Honeypot hit.
2019-06-30 11:50:14
101.81.48.131 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-29 20:47:41]
2019-06-30 11:12:48

Recently Reported IPs

117.66.142.70 117.66.142.75 117.66.143.77 117.66.143.78
117.66.143.86 117.66.143.89 117.66.143.90 117.66.143.93
117.66.143.94 117.66.143.96 117.66.143.98 117.66.148.10
117.66.148.101 117.66.148.102 117.66.148.106 117.66.148.108
117.66.148.110 117.66.148.113 117.66.148.115 117.66.148.116