Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Collierville

Region: Tennessee

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.81.213.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60964
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;199.81.213.134.			IN	A

;; AUTHORITY SECTION:
.			345	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092101 1800 900 604800 86400

;; Query time: 219 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 22 08:58:17 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 134.213.81.199.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.213.81.199.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.244.192.132 attackbotsspam
Fail2Ban Ban Triggered
2020-06-14 20:50:36
201.141.231.221 attackspambots
Unauthorized connection attempt from IP address 201.141.231.221 on Port 445(SMB)
2020-06-14 20:32:28
207.180.202.61 attackbots
SIPVicious Scanner Detection
2020-06-14 20:31:51
54.38.180.93 attackspambots
SSH bruteforce
2020-06-14 20:34:01
111.229.116.240 attackspam
Jun 14 06:48:15 ArkNodeAT sshd\[26737\]: Invalid user xy from 111.229.116.240
Jun 14 06:48:15 ArkNodeAT sshd\[26737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.116.240
Jun 14 06:48:17 ArkNodeAT sshd\[26737\]: Failed password for invalid user xy from 111.229.116.240 port 41054 ssh2
2020-06-14 20:37:19
103.226.147.78 attackbotsspam
Unauthorized connection attempt from IP address 103.226.147.78 on Port 445(SMB)
2020-06-14 20:26:50
49.235.240.251 attackbotsspam
2020-06-14T03:40:56.996937abusebot.cloudsearch.cf sshd[1587]: Invalid user nmj from 49.235.240.251 port 36802
2020-06-14T03:40:57.004914abusebot.cloudsearch.cf sshd[1587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.240.251
2020-06-14T03:40:56.996937abusebot.cloudsearch.cf sshd[1587]: Invalid user nmj from 49.235.240.251 port 36802
2020-06-14T03:40:59.110985abusebot.cloudsearch.cf sshd[1587]: Failed password for invalid user nmj from 49.235.240.251 port 36802 ssh2
2020-06-14T03:45:33.928359abusebot.cloudsearch.cf sshd[1851]: Invalid user meitao from 49.235.240.251 port 59282
2020-06-14T03:45:33.933660abusebot.cloudsearch.cf sshd[1851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.240.251
2020-06-14T03:45:33.928359abusebot.cloudsearch.cf sshd[1851]: Invalid user meitao from 49.235.240.251 port 59282
2020-06-14T03:45:35.929320abusebot.cloudsearch.cf sshd[1851]: Failed password for invalid
...
2020-06-14 20:05:08
1.34.223.194 attackbotsspam
Attempted connection to port 8000.
2020-06-14 20:27:20
85.239.35.161 attack
Jun 14 14:56:28 server2 sshd\[13173\]: Invalid user admin from 85.239.35.161
Jun 14 14:56:28 server2 sshd\[13161\]: Invalid user admin from 85.239.35.161
Jun 14 14:56:28 server2 sshd\[13163\]: Invalid user user from 85.239.35.161
Jun 14 14:56:28 server2 sshd\[13164\]: Invalid user user from 85.239.35.161
Jun 14 14:56:28 server2 sshd\[13160\]: Invalid user admin from 85.239.35.161
Jun 14 14:56:29 server2 sshd\[13162\]: Invalid user user from 85.239.35.161
2020-06-14 20:22:04
194.28.15.77 attackbotsspam
xmlrpc attack
2020-06-14 20:27:39
157.230.125.207 attack
Jun 14 11:15:01 scw-tender-jepsen sshd[32478]: Failed password for root from 157.230.125.207 port 27847 ssh2
2020-06-14 20:48:54
203.78.126.211 attackspambots
1592106312 - 06/14/2020 05:45:12 Host: 203.78.126.211/203.78.126.211 Port: 445 TCP Blocked
2020-06-14 20:42:12
200.60.99.113 attackbotsspam
Unauthorized connection attempt from IP address 200.60.99.113 on Port 445(SMB)
2020-06-14 20:44:53
197.149.170.234 attack
Unauthorized connection attempt from IP address 197.149.170.234 on Port 445(SMB)
2020-06-14 20:49:50
171.244.36.122 attackspam
Jun 13 00:32:52 xxxxxxx5185820 sshd[11790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.36.122  user=r.r
Jun 13 00:32:54 xxxxxxx5185820 sshd[11790]: Failed password for r.r from 171.244.36.122 port 34884 ssh2
Jun 13 00:32:54 xxxxxxx5185820 sshd[11790]: Received disconnect from 171.244.36.122 port 34884:11: Bye Bye [preauth]
Jun 13 00:32:54 xxxxxxx5185820 sshd[11790]: Disconnected from 171.244.36.122 port 34884 [preauth]
Jun 13 00:44:24 xxxxxxx5185820 sshd[13338]: Invalid user naga from 171.244.36.122 port 46612
Jun 13 00:44:24 xxxxxxx5185820 sshd[13338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.36.122
Jun 13 00:44:26 xxxxxxx5185820 sshd[13338]: Failed password for invalid user naga from 171.244.36.122 port 46612 ssh2
Jun 13 00:44:27 xxxxxxx5185820 sshd[13338]: Received disconnect from 171.244.36.122 port 46612:11: Bye Bye [preauth]
Jun 13 00:44:27 xxxxxxx5185820 ss........
-------------------------------
2020-06-14 20:10:01

Recently Reported IPs

180.215.136.98 176.107.81.102 92.241.111.7 2001:df0:411:8003:7b65:8f60:1164:4c50
95.141.113.64 186.92.158.176 45.69.120.94 95.131.133.23
86.46.58.254 208.12.234.245 103.193.175.28 91.234.126.200
46.99.195.53 218.249.94.132 201.48.4.15 64.73.88.153
118.181.77.110 38.96.134.179 206.104.224.11 169.102.241.33