Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.215.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61605
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.215.81.			IN	A

;; AUTHORITY SECTION:
.			391	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 09:54:15 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 81.215.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.215.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
2.56.242.36 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-03 23:20:15
49.224.160.183 attack
23/tcp 23/tcp
[2019-07-30/08-03]2pkt
2019-08-03 23:16:41
114.33.172.244 attack
Telnet/23 MH Probe, BF, Hack -
2019-08-03 23:18:46
213.133.3.8 attackbots
Aug  3 14:24:33 server sshd[59261]: Failed password for invalid user asam from 213.133.3.8 port 45501 ssh2
Aug  3 14:30:28 server sshd[59735]: Failed password for invalid user brazil from 213.133.3.8 port 51412 ssh2
Aug  3 14:34:44 server sshd[60066]: Failed password for invalid user test from 213.133.3.8 port 48724 ssh2
2019-08-03 22:47:22
118.175.46.191 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-06-26/08-03]16pkt,1pt.(tcp)
2019-08-03 23:11:51
106.51.66.114 attackspam
445/tcp 445/tcp 445/tcp...
[2019-06-03/08-03]5pkt,1pt.(tcp)
2019-08-03 22:21:50
94.101.129.119 attack
Automatic report - Port Scan Attack
2019-08-03 22:25:01
62.133.141.171 attackbotsspam
NAME : OST-ISP-NET3 CIDR :  | EMAIL - SPAM {Looking for resource vulnerabilities} DDoS Attack Poland "" - block certain countries :) IP: 62.133.141.171  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-03 23:11:30
201.131.225.133 attackspambots
libpam_shield report: forced login attempt
2019-08-03 22:23:13
209.186.58.108 attackbotsspam
scan z
2019-08-03 23:23:28
200.115.32.36 attackspambots
Aug  3 17:17:41 vps01 sshd[11923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.115.32.36
Aug  3 17:17:42 vps01 sshd[11923]: Failed password for invalid user mysql2 from 200.115.32.36 port 54536 ssh2
2019-08-03 23:28:12
187.218.57.29 attackbotsspam
Aug  3 17:28:10 vps691689 sshd[5515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.218.57.29
Aug  3 17:28:12 vps691689 sshd[5515]: Failed password for invalid user vg from 187.218.57.29 port 47872 ssh2
...
2019-08-03 23:36:27
170.0.125.75 attackspam
email spam
2019-08-03 22:46:27
103.22.171.1 attackbotsspam
Invalid user elasticsearch from 103.22.171.1 port 46226
2019-08-03 22:35:01
182.254.163.139 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2019-08-03 23:19:12

Recently Reported IPs

1.20.215.70 1.20.215.86 1.20.215.90 1.20.216.10
1.20.216.102 1.20.216.108 1.20.216.120 1.20.216.127
19.174.17.90 1.20.216.138 1.20.216.148 1.20.216.150
1.20.216.170 1.20.216.181 1.20.216.194 1.20.216.207
1.20.216.216 1.20.216.220 1.20.216.225 1.20.216.229