Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.81.8.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24957
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.81.8.219.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:35:25 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 219.8.81.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.8.81.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
197.248.2.229 attack
Triggered by Fail2Ban at Vostok web server
2020-01-27 14:20:12
45.82.35.97 attackspambots
Postfix RBL failed
2020-01-27 14:09:12
107.170.113.190 attack
Scanned 3 times in the last 24 hours on port 22
2020-01-27 13:59:09
46.38.144.22 attackbots
Rude login attack (404 tries in 1d)
2020-01-27 14:08:14
206.189.142.10 attackbotsspam
Jan 27 08:54:10 hosting sshd[31756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.142.10  user=mysql
Jan 27 08:54:12 hosting sshd[31756]: Failed password for mysql from 206.189.142.10 port 34696 ssh2
...
2020-01-27 14:19:50
179.235.96.116 attackbotsspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-01-27 14:02:20
111.231.239.143 attackbots
Unauthorized connection attempt detected from IP address 111.231.239.143 to port 2220 [J]
2020-01-27 14:18:46
80.82.70.239 attack
01/27/2020-07:06:27.458480 80.82.70.239 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2020-01-27 14:24:25
66.249.65.127 attackbotsspam
Automatic report - Banned IP Access
2020-01-27 14:14:55
142.93.163.77 attackbots
2020-01-27T07:16:17.548609scmdmz1 sshd[18987]: Invalid user grader from 142.93.163.77 port 37622
2020-01-27T07:16:17.551665scmdmz1 sshd[18987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77
2020-01-27T07:16:17.548609scmdmz1 sshd[18987]: Invalid user grader from 142.93.163.77 port 37622
2020-01-27T07:16:19.552143scmdmz1 sshd[18987]: Failed password for invalid user grader from 142.93.163.77 port 37622 ssh2
2020-01-27T07:18:23.358191scmdmz1 sshd[19250]: Invalid user test from 142.93.163.77 port 56980
...
2020-01-27 14:23:05
222.186.180.147 attackbotsspam
Probing port 22
2020-01-27 13:54:22
103.9.157.25 attack
Unauthorized connection attempt detected from IP address 103.9.157.25 to port 2220 [J]
2020-01-27 14:19:18
93.2.134.147 attack
Jan 27 00:12:28 josie sshd[19799]: Invalid user ubuntu from 93.2.134.147
Jan 27 00:12:28 josie sshd[19799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.2.134.147 
Jan 27 00:12:30 josie sshd[19799]: Failed password for invalid user ubuntu from 93.2.134.147 port 60154 ssh2
Jan 27 00:12:30 josie sshd[19800]: Received disconnect from 93.2.134.147: 11: Bye Bye
Jan 27 00:31:31 josie sshd[781]: Invalid user admin from 93.2.134.147
Jan 27 00:31:31 josie sshd[781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.2.134.147 
Jan 27 00:31:33 josie sshd[781]: Failed password for invalid user admin from 93.2.134.147 port 56650 ssh2
Jan 27 00:31:33 josie sshd[783]: Received disconnect from 93.2.134.147: 11: Bye Bye
Jan 27 00:34:18 josie sshd[3127]: Invalid user pascual from 93.2.134.147
Jan 27 00:34:18 josie sshd[3127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ru........
-------------------------------
2020-01-27 14:11:31
37.187.115.163 attackbotsspam
Unauthorized connection attempt detected from IP address 37.187.115.163 to port 2220 [J]
2020-01-27 14:06:35
185.132.47.24 attackspam
RDP Brute-Force (honeypot 6)
2020-01-27 13:52:39

Recently Reported IPs

126.228.9.249 225.13.152.10 114.41.86.63 123.254.230.239
207.228.8.25 129.225.6.105 85.183.118.250 244.88.254.23
219.99.121.228 153.251.79.39 245.145.122.215 149.255.144.161
19.126.39.8 8.11.157.150 7.236.15.5 204.217.104.139
163.154.236.116 133.82.212.208 62.59.128.194 223.230.47.181