Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.81.216.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38407
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.81.216.239.			IN	A

;; AUTHORITY SECTION:
.			241	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 09:56:14 CST 2022
;; MSG SIZE  rcvd: 105
Host info
239.216.81.2.in-addr.arpa domain name pointer bl20-216-239.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.216.81.2.in-addr.arpa	name = bl20-216-239.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
12.94.144.134 attackbots
IP 12.94.144.134 attacked honeypot on port: 8080 at 8/24/2020 8:50:05 PM
2020-08-25 18:45:29
77.53.171.136 attackbotsspam
SSH invalid-user multiple login try
2020-08-25 18:49:10
106.12.95.45 attack
Aug 25 10:16:55 v22019038103785759 sshd\[19830\]: Invalid user lcm from 106.12.95.45 port 50798
Aug 25 10:16:55 v22019038103785759 sshd\[19830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.95.45
Aug 25 10:16:57 v22019038103785759 sshd\[19830\]: Failed password for invalid user lcm from 106.12.95.45 port 50798 ssh2
Aug 25 10:19:37 v22019038103785759 sshd\[20205\]: Invalid user potente from 106.12.95.45 port 58936
Aug 25 10:19:38 v22019038103785759 sshd\[20205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.95.45
...
2020-08-25 18:51:56
217.182.192.217 attackbots
SSH Brute-Force attacks
2020-08-25 18:59:22
113.116.94.90 attackspambots
spam
2020-08-25 19:16:44
200.71.72.14 attackbotsspam
spam
2020-08-25 19:15:39
103.79.74.26 attack
Dovecot Invalid User Login Attempt.
2020-08-25 18:52:12
106.13.35.167 attack
Invalid user oracle from 106.13.35.167 port 34428
2020-08-25 19:03:03
103.81.114.182 attack
spam
2020-08-25 19:17:06
45.127.62.51 attack
spam
2020-08-25 19:21:10
149.202.160.192 attackspam
Invalid user amir from 149.202.160.192 port 51739
2020-08-25 19:20:13
191.103.217.49 attackspam
Port probing on unauthorized port 8080
2020-08-25 18:59:46
77.120.93.135 attack
spam
2020-08-25 19:13:10
191.187.39.66 attackspambots
Port probing on unauthorized port 23
2020-08-25 19:16:13
111.241.133.104 attack
20/8/24@23:49:26: FAIL: Alarm-Network address from=111.241.133.104
20/8/24@23:49:26: FAIL: Alarm-Network address from=111.241.133.104
...
2020-08-25 19:07:04

Recently Reported IPs

47.97.207.154 45.83.65.143 171.212.103.245 124.110.183.105
83.168.84.123 167.71.251.16 101.133.219.176 94.244.178.55
110.42.156.212 222.134.175.62 49.83.129.245 185.3.235.206
36.6.45.36 87.202.141.103 176.40.40.224 111.20.77.206
182.117.40.162 46.4.32.20 196.3.97.34 95.71.227.85