Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.81.118.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23318
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;135.81.118.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 01:35:45 CST 2025
;; MSG SIZE  rcvd: 106
Host info
42.118.81.135.in-addr.arpa domain name pointer nothing.attdns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.118.81.135.in-addr.arpa	name = nothing.attdns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.207.94.252 attackspam
Oct 13 18:47:28 vpn01 sshd[2388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.94.252
Oct 13 18:47:29 vpn01 sshd[2388]: Failed password for invalid user hf from 123.207.94.252 port 14187 ssh2
...
2020-10-14 00:59:37
125.86.191.19 attack
SSH/22 MH Probe, BF, Hack -
2020-10-14 00:44:20
117.156.119.39 attackbots
various type of attack
2020-10-14 00:49:47
194.5.207.189 attackbotsspam
194.5.207.189 (DE/Germany/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 13 12:54:56 server2 sshd[3605]: Failed password for root from 60.196.69.234 port 52453 ssh2
Oct 13 12:56:08 server2 sshd[3877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.207.189  user=root
Oct 13 12:54:53 server2 sshd[3605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.196.69.234  user=root
Oct 13 12:49:28 server2 sshd[2064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.249.55.68  user=root
Oct 13 12:48:53 server2 sshd[1880]: Failed password for root from 123.207.74.24 port 36820 ssh2
Oct 13 12:48:51 server2 sshd[1880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.74.24  user=root

IP Addresses Blocked:

60.196.69.234 (KR/South Korea/-)
2020-10-14 01:22:14
218.92.0.175 attack
Oct 13 19:01:22 sso sshd[32282]: Failed password for root from 218.92.0.175 port 16082 ssh2
Oct 13 19:01:25 sso sshd[32282]: Failed password for root from 218.92.0.175 port 16082 ssh2
...
2020-10-14 01:14:06
181.164.2.121 attackbotsspam
Oct 13 18:54:36 pkdns2 sshd\[49569\]: Invalid user alexa from 181.164.2.121Oct 13 18:54:37 pkdns2 sshd\[49569\]: Failed password for invalid user alexa from 181.164.2.121 port 56272 ssh2Oct 13 18:58:07 pkdns2 sshd\[49761\]: Invalid user bryan from 181.164.2.121Oct 13 18:58:09 pkdns2 sshd\[49761\]: Failed password for invalid user bryan from 181.164.2.121 port 41620 ssh2Oct 13 19:00:37 pkdns2 sshd\[49894\]: Failed password for ntp from 181.164.2.121 port 44920 ssh2Oct 13 19:02:55 pkdns2 sshd\[49974\]: Invalid user jh from 181.164.2.121
...
2020-10-14 00:57:18
156.96.47.5 attack
IP: 156.96.47.5
Ports affected
    Simple Mail Transfer (25) 
Abuse Confidence rating 55%
Found in DNSBL('s)
ASN Details
   AS46664 VDI-NETWORK
   United States (US)
   CIDR 156.96.44.0/22
Log Date: 13/10/2020 12:10:59 PM UTC
2020-10-14 01:21:13
61.177.172.104 attackspambots
Brute-force attempt banned
2020-10-14 01:20:25
103.26.136.173 attackspam
Invalid user nieto from 103.26.136.173 port 48482
2020-10-14 00:52:49
196.1.97.206 attackspambots
Fail2Ban Ban Triggered (2)
2020-10-14 00:55:42
175.24.67.217 attack
Invalid user deployer from 175.24.67.217 port 33436
2020-10-14 00:47:43
45.116.112.22 attackspam
Oct 13 19:45:08 ift sshd\[53464\]: Invalid user tony from 45.116.112.22Oct 13 19:45:11 ift sshd\[53464\]: Failed password for invalid user tony from 45.116.112.22 port 48876 ssh2Oct 13 19:49:24 ift sshd\[53867\]: Invalid user naoya from 45.116.112.22Oct 13 19:49:26 ift sshd\[53867\]: Failed password for invalid user naoya from 45.116.112.22 port 53784 ssh2Oct 13 19:53:31 ift sshd\[54614\]: Invalid user marci from 45.116.112.22
...
2020-10-14 01:13:40
177.220.133.158 attackbotsspam
$f2bV_matches
2020-10-14 01:15:26
27.220.80.13 attack
DATE:2020-10-12 22:43:01, IP:27.220.80.13, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-10-14 01:20:52
193.112.110.35 attack
SSH brute-force attack detected from [193.112.110.35]
2020-10-14 01:03:46

Recently Reported IPs

165.69.31.185 167.188.153.194 46.30.196.166 185.105.109.82
233.22.245.150 195.166.140.25 136.65.64.134 60.126.74.150
176.216.114.244 69.221.167.75 104.180.98.245 124.112.190.29
163.94.65.243 174.171.153.125 164.240.244.100 74.89.75.17
207.149.119.51 236.180.80.167 23.140.92.27 145.163.51.64