Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: Rautaruukki Oyj

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.81.185.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54490
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;146.81.185.214.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 15 03:03:40 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 214.185.81.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.82.98
Address:	183.60.82.98#53

Non-authoritative answer:
*** Can't find 214.185.81.146.in-addr.arpa.: No answer

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
200.129.246.10 attack
(sshd) Failed SSH login from 200.129.246.10 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 27 03:32:47 localhost sshd[1552]: Invalid user ecc from 200.129.246.10 port 35460
Mar 27 03:32:49 localhost sshd[1552]: Failed password for invalid user ecc from 200.129.246.10 port 35460 ssh2
Mar 27 03:44:52 localhost sshd[2468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.129.246.10  user=rpcuser
Mar 27 03:44:54 localhost sshd[2468]: Failed password for rpcuser from 200.129.246.10 port 27525 ssh2
Mar 27 03:51:34 localhost sshd[3011]: Invalid user lifetech from 200.129.246.10 port 63413
2020-03-27 16:55:02
96.78.177.242 attack
Invalid user cak from 96.78.177.242 port 45210
2020-03-27 16:36:29
36.92.69.26 attack
Brute-force attempt banned
2020-03-27 16:33:31
212.64.77.154 attack
Invalid user wj from 212.64.77.154 port 34084
2020-03-27 16:32:04
190.154.48.51 attackspambots
Invalid user user from 190.154.48.51 port 39947
2020-03-27 16:29:23
129.204.63.100 attack
(sshd) Failed SSH login from 129.204.63.100 (CN/China/-): 5 in the last 3600 secs
2020-03-27 16:49:20
123.110.111.123 attackspambots
" "
2020-03-27 16:29:56
213.32.23.54 attackbotsspam
Invalid user sh from 213.32.23.54 port 38572
2020-03-27 16:55:46
49.235.93.12 attack
Invalid user maintenance from 49.235.93.12 port 40108
2020-03-27 16:51:00
112.220.238.3 attackbotsspam
SSH Brute-Forcing (server1)
2020-03-27 16:36:07
185.216.140.31 attackbots
Unauthorized connection attempt detected from IP address 185.216.140.31 to port 4043 [T]
2020-03-27 17:02:36
148.102.17.19 attackspambots
2020-03-27T05:54:50.316950shield sshd\[29416\]: Invalid user jy from 148.102.17.19 port 46521
2020-03-27T05:54:50.322665shield sshd\[29416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.102.17.19
2020-03-27T05:54:51.884570shield sshd\[29416\]: Failed password for invalid user jy from 148.102.17.19 port 46521 ssh2
2020-03-27T06:00:05.232084shield sshd\[30141\]: Invalid user okr from 148.102.17.19 port 47662
2020-03-27T06:00:05.235942shield sshd\[30141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.102.17.19
2020-03-27 16:49:02
106.12.5.77 attackbots
firewall-block, port(s): 22549/tcp
2020-03-27 16:19:09
117.4.104.38 attack
20/3/27@03:17:23: FAIL: Alarm-Network address from=117.4.104.38
20/3/27@03:17:23: FAIL: Alarm-Network address from=117.4.104.38
...
2020-03-27 16:28:18
79.137.72.98 attackspambots
Invalid user yt from 79.137.72.98 port 34770
2020-03-27 16:35:09

Recently Reported IPs

177.154.230.18 107.219.137.230 68.101.5.66 27.166.196.181
13.248.97.23 41.214.150.225 195.54.201.12 44.241.235.233
159.154.128.228 208.246.14.211 165.134.159.75 95.173.149.96
196.250.200.13 154.249.57.131 80.203.138.142 208.26.8.44
133.29.103.27 119.114.252.194 49.1.20.248 184.161.157.178