Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.73.55.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21478
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.73.55.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030600 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 01:37:46 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 81.55.73.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.55.73.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.148.143.235 attackbots
Sat, 20 Jul 2019 21:53:53 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:51:37
41.143.170.169 attack
Sat, 20 Jul 2019 21:53:49 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:06:20
183.80.21.60 attack
445/tcp
[2019-07-21]1pkt
2019-07-21 15:44:38
14.231.245.186 attackbotsspam
Sat, 20 Jul 2019 21:53:43 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:24:44
188.120.241.104 attackspambots
Jul 19 10:20:38 nbi10516-7 sshd[4981]: Did not receive identification string from 188.120.241.104 port 40374
Jul 19 10:20:39 nbi10516-7 sshd[4982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.120.241.104  user=r.r
Jul 19 10:20:40 nbi10516-7 sshd[4982]: Failed password for r.r from 188.120.241.104 port 40390 ssh2
Jul 19 10:20:40 nbi10516-7 sshd[4982]: error: Received disconnect from 188.120.241.104 port 40390:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
Jul 19 10:20:40 nbi10516-7 sshd[4982]: Disconnected from 188.120.241.104 port 40390 [preauth]
Jul 19 10:20:41 nbi10516-7 sshd[5003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.120.241.104  user=r.r
Jul 19 10:20:43 nbi10516-7 sshd[5003]: Failed password for r.r from 188.120.241.104 port 40628 ssh2
Jul 19 10:20:43 nbi10516-7 sshd[5003]: error: Received disconnect from 188.120.241.104 port 40628:3: com.jcraft.jsch.JSchEx........
-------------------------------
2019-07-21 15:25:45
176.193.149.42 attackbotsspam
Sat, 20 Jul 2019 21:53:45 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:16:53
217.113.242.191 attackbots
8080/tcp
[2019-07-21]1pkt
2019-07-21 15:46:56
139.199.48.216 attackbots
Jul 21 01:54:03 aat-srv002 sshd[3207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.48.216
Jul 21 01:54:06 aat-srv002 sshd[3207]: Failed password for invalid user buster from 139.199.48.216 port 33304 ssh2
Jul 21 01:57:50 aat-srv002 sshd[3270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.48.216
Jul 21 01:57:51 aat-srv002 sshd[3270]: Failed password for invalid user wolfgang from 139.199.48.216 port 38984 ssh2
...
2019-07-21 14:58:16
174.138.186.90 attackspam
2019-07-21T04:08:36.477026 X postfix/smtpd[49764]: warning: unknown[174.138.186.90]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-21T04:08:43.073228 X postfix/smtpd[49766]: warning: unknown[174.138.186.90]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-21T04:08:53.049925 X postfix/smtpd[49768]: warning: unknown[174.138.186.90]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-21 15:04:44
136.228.129.17 attackbotsspam
Sat, 20 Jul 2019 21:53:54 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:50:21
202.142.151.162 attackbotsspam
Unauthorized connection attempt from IP address 202.142.151.162 on Port 445(SMB)
2019-07-21 14:48:20
36.79.77.29 attackspambots
Sat, 20 Jul 2019 21:53:51 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:01:00
154.66.113.78 attackspambots
Unauthorized SSH login attempts
2019-07-21 15:27:07
79.53.66.117 attackbotsspam
Sat, 20 Jul 2019 21:53:39 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:38:10
14.242.129.77 attackspam
Sat, 20 Jul 2019 21:53:45 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:18:39

Recently Reported IPs

138.222.93.79 78.170.44.248 221.65.178.119 228.72.111.200
178.136.182.117 120.40.85.194 40.242.156.176 47.146.44.143
217.10.53.83 203.120.92.60 224.183.34.17 234.125.41.66
198.229.167.138 39.84.104.183 143.241.101.40 244.182.95.64
60.250.228.96 5.35.137.147 137.124.116.93 109.130.250.144