Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.81.230.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.81.230.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 13:49:21 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 136.230.81.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.230.81.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.63.194.106 attackbotsspam
Apr 19 22:19:24 vmd38886 sshd\[26703\]: Invalid user user from 92.63.194.106 port 41841
Apr 19 22:19:24 vmd38886 sshd\[26703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.106
Apr 19 22:19:26 vmd38886 sshd\[26703\]: Failed password for invalid user user from 92.63.194.106 port 41841 ssh2
2020-04-20 04:52:07
106.13.230.219 attack
IP blocked
2020-04-20 04:20:33
163.172.125.208 attackbotsspam
163.172.125.208 - - [19/Apr/2020:23:15:47 +0300] "POST /wp-login.php HTTP/1.1" 200 2172 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-20 04:36:42
129.213.19.126 attackspam
Apr 19 15:59:35 r.ca sshd[25193]: Failed password for invalid user A5 from 129.213.19.126 port 63753 ssh2
2020-04-20 04:40:36
157.245.12.36 attackbots
(sshd) Failed SSH login from 157.245.12.36 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 19 21:46:02 ubnt-55d23 sshd[4078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.12.36  user=root
Apr 19 21:46:03 ubnt-55d23 sshd[4078]: Failed password for root from 157.245.12.36 port 47578 ssh2
2020-04-20 04:09:10
49.234.12.123 attack
Apr 19 22:09:55 srv01 sshd[20724]: Invalid user ftpuser from 49.234.12.123 port 37970
Apr 19 22:09:55 srv01 sshd[20724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.12.123
Apr 19 22:09:55 srv01 sshd[20724]: Invalid user ftpuser from 49.234.12.123 port 37970
Apr 19 22:09:57 srv01 sshd[20724]: Failed password for invalid user ftpuser from 49.234.12.123 port 37970 ssh2
Apr 19 22:15:57 srv01 sshd[21083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.12.123  user=root
Apr 19 22:15:59 srv01 sshd[21083]: Failed password for root from 49.234.12.123 port 47574 ssh2
...
2020-04-20 04:18:59
180.76.54.86 attackbots
Repeated brute force against a port
2020-04-20 04:22:21
181.46.24.98 attackspambots
1587327358 - 04/19/2020 22:15:58 Host: 181.46.24.98/181.46.24.98 Port: 445 TCP Blocked
2020-04-20 04:20:12
114.234.255.211 attack
SpamScore above: 10.0
2020-04-20 04:44:32
134.209.71.245 attack
Apr 19 13:00:27 mockhub sshd[15442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.71.245
Apr 19 13:00:29 mockhub sshd[15442]: Failed password for invalid user admin from 134.209.71.245 port 38844 ssh2
...
2020-04-20 04:11:25
121.229.18.144 attackbots
Apr 19 22:13:01 legacy sshd[17453]: Failed password for root from 121.229.18.144 port 43042 ssh2
Apr 19 22:15:50 legacy sshd[17678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.18.144
Apr 19 22:15:52 legacy sshd[17678]: Failed password for invalid user saslauth from 121.229.18.144 port 59696 ssh2
...
2020-04-20 04:27:41
123.206.30.76 attack
$f2bV_matches
2020-04-20 04:13:38
139.28.206.11 attackspam
Apr 20 01:27:46 gw1 sshd[29567]: Failed password for root from 139.28.206.11 port 45340 ssh2
Apr 20 01:30:42 gw1 sshd[29700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.28.206.11
...
2020-04-20 04:50:38
186.89.208.87 attack
Unauthorized connection attempt from IP address 186.89.208.87 on Port 445(SMB)
2020-04-20 04:45:32
182.61.3.157 attackbots
Apr 19 22:15:48 vps sshd\[14118\]: Invalid user admin from 182.61.3.157
Apr 19 22:15:48 vps sshd\[14117\]: Invalid user admin from 182.61.3.157
...
2020-04-20 04:32:58

Recently Reported IPs

212.13.138.183 222.148.122.18 131.204.56.197 8.123.52.77
248.219.219.248 116.193.21.39 104.110.119.120 182.173.163.250
204.134.10.36 152.109.84.84 52.213.137.243 74.39.58.230
129.160.143.23 153.248.254.16 225.119.141.238 254.93.219.252
244.145.22.67 155.214.40.85 235.251.225.86 51.86.207.77