Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.2.81.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.2.81.226.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:03:47 CST 2024
;; MSG SIZE  rcvd: 104
Host info
Host 226.81.2.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 226.81.2.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.86.73.158 attack
Unauthorized connection attempt detected from IP address 167.86.73.158 to port 2220 [J]
2020-01-28 02:20:29
104.54.180.97 attackbots
Invalid user newuser from 104.54.180.97 port 52044
2020-01-28 02:09:36
85.21.144.6 attackspam
Invalid user hamish from 85.21.144.6 port 43146
2020-01-28 01:59:11
170.130.187.50 attackbots
161/udp 21/tcp 88/tcp...
[2019-11-26/2020-01-27]53pkt,12pt.(tcp),1pt.(udp)
2020-01-28 02:39:52
14.169.130.247 attackspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-01-28 02:00:16
203.54.14.77 attack
Unauthorized connection attempt detected from IP address 203.54.14.77 to port 23 [J]
2020-01-28 02:33:19
171.217.94.224 attackbotsspam
Unauthorized connection attempt from IP address 171.217.94.224 on Port 445(SMB)
2020-01-28 02:16:08
5.133.66.239 attack
postfix
2020-01-28 02:01:16
175.175.207.60 attackspam
Unauthorized connection attempt detected from IP address 175.175.207.60 to port 23 [J]
2020-01-28 02:36:45
49.249.240.20 attackbots
Unauthorized connection attempt from IP address 49.249.240.20 on Port 445(SMB)
2020-01-28 02:04:48
61.177.172.128 attackspam
Jan 27 19:02:52 meumeu sshd[747]: Failed password for root from 61.177.172.128 port 36882 ssh2
Jan 27 19:02:57 meumeu sshd[747]: Failed password for root from 61.177.172.128 port 36882 ssh2
Jan 27 19:03:01 meumeu sshd[747]: Failed password for root from 61.177.172.128 port 36882 ssh2
Jan 27 19:03:05 meumeu sshd[747]: Failed password for root from 61.177.172.128 port 36882 ssh2
...
2020-01-28 02:05:48
36.79.63.166 attackbots
Unauthorized connection attempt from IP address 36.79.63.166 on Port 445(SMB)
2020-01-28 01:57:41
112.85.42.182 attack
Jan 27 18:42:31 sso sshd[19390]: Failed password for root from 112.85.42.182 port 38445 ssh2
Jan 27 18:42:34 sso sshd[19390]: Failed password for root from 112.85.42.182 port 38445 ssh2
...
2020-01-28 02:15:33
88.250.162.229 attackbotsspam
Automatic report - Port Scan Attack
2020-01-28 02:25:32
41.188.142.242 attack
Unauthorized connection attempt from IP address 41.188.142.242 on Port 445(SMB)
2020-01-28 02:00:53

Recently Reported IPs

11.2.201.66 11.2.90.141 11.2.179.7 11.20.248.60
11.2.213.139 11.20.109.156 11.2.41.149 11.199.7.27
11.20.105.226 11.2.101.204 11.20.65.206 11.2.145.224
11.2.125.219 11.202.12.121 11.2.247.22 11.2.133.249
11.199.65.94 11.20.134.71 11.199.89.184 11.201.91.172