Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: North Bergen

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
206.81.11.216 attackspam
Apr 30 07:12:01 ws25vmsma01 sshd[120265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216
Apr 30 07:12:03 ws25vmsma01 sshd[120265]: Failed password for invalid user chenpq from 206.81.11.216 port 35484 ssh2
...
2020-04-30 15:40:02
206.81.11.216 attackspambots
Apr 26 12:52:55 web8 sshd\[4583\]: Invalid user secretariat from 206.81.11.216
Apr 26 12:52:55 web8 sshd\[4583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216
Apr 26 12:52:57 web8 sshd\[4583\]: Failed password for invalid user secretariat from 206.81.11.216 port 52616 ssh2
Apr 26 12:57:38 web8 sshd\[7138\]: Invalid user dod from 206.81.11.216
Apr 26 12:57:38 web8 sshd\[7138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216
2020-04-27 00:58:47
206.81.11.216 attackbotsspam
Apr 15 08:53:35 eventyay sshd[10945]: Failed password for root from 206.81.11.216 port 42040 ssh2
Apr 15 09:00:34 eventyay sshd[11196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216
Apr 15 09:00:36 eventyay sshd[11196]: Failed password for invalid user ntps from 206.81.11.216 port 57964 ssh2
...
2020-04-15 15:32:57
206.81.11.216 attackspam
Apr 13 15:09:47 santamaria sshd\[8175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216  user=root
Apr 13 15:09:49 santamaria sshd\[8175\]: Failed password for root from 206.81.11.216 port 41152 ssh2
Apr 13 15:12:06 santamaria sshd\[8191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216  user=root
...
2020-04-13 21:40:43
206.81.11.216 attackbotsspam
Apr 10 05:06:05 XXXXXX sshd[25141]: Invalid user temp1 from 206.81.11.216 port 55660
2020-04-10 15:44:15
206.81.11.216 attack
SSH Bruteforce attack
2020-04-08 19:36:35
206.81.11.216 attackbotsspam
(sshd) Failed SSH login from 206.81.11.216 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  5 17:00:59 ubnt-55d23 sshd[2007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216  user=root
Apr  5 17:01:01 ubnt-55d23 sshd[2007]: Failed password for root from 206.81.11.216 port 37302 ssh2
2020-04-06 05:38:55
206.81.11.216 attackspam
SSH brute force attempt
2020-03-24 04:57:32
206.81.11.216 attackbots
Mar 22 21:07:33 web1 sshd\[4780\]: Invalid user lfz from 206.81.11.216
Mar 22 21:07:33 web1 sshd\[4780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216
Mar 22 21:07:35 web1 sshd\[4780\]: Failed password for invalid user lfz from 206.81.11.216 port 54880 ssh2
Mar 22 21:13:28 web1 sshd\[5436\]: Invalid user lise from 206.81.11.216
Mar 22 21:13:28 web1 sshd\[5436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216
2020-03-23 15:16:37
206.81.11.216 attackspam
$f2bV_matches
2020-03-05 20:01:13
206.81.11.216 attack
Mar  3 12:03:29 vps691689 sshd[12663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216
Mar  3 12:03:31 vps691689 sshd[12663]: Failed password for invalid user lijiang from 206.81.11.216 port 43908 ssh2
...
2020-03-03 19:22:53
206.81.11.216 attackspam
Feb 18 16:01:21 server sshd\[16325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216  user=root
Feb 18 16:01:24 server sshd\[16325\]: Failed password for root from 206.81.11.216 port 60758 ssh2
Feb 18 16:20:37 server sshd\[20441\]: Invalid user ubuntu from 206.81.11.216
Feb 18 16:20:37 server sshd\[20441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216 
Feb 18 16:20:39 server sshd\[20441\]: Failed password for invalid user ubuntu from 206.81.11.216 port 36142 ssh2
...
2020-02-19 03:58:49
206.81.11.216 attackspam
Feb  8 02:09:50 legacy sshd[2102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216
Feb  8 02:09:52 legacy sshd[2102]: Failed password for invalid user vtc from 206.81.11.216 port 36682 ssh2
Feb  8 02:13:02 legacy sshd[2250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216
...
2020-02-08 09:26:59
206.81.11.216 attackbots
Unauthorized connection attempt detected from IP address 206.81.11.216 to port 2220 [J]
2020-02-03 13:11:39
206.81.11.216 attack
Unauthorized connection attempt detected from IP address 206.81.11.216 to port 2220 [J]
2020-01-26 17:18:27
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       206.81.0.0 - 206.81.31.255
CIDR:           206.81.0.0/19
NetName:        DIGITALOCEAN-206-81-0-0
NetHandle:      NET-206-81-0-0-1
Parent:         NET206 (NET-206-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   DigitalOcean, LLC (DO-13)
RegDate:        1995-08-11
Updated:        2020-04-03
Comment:        Routing and Peering Policy can be found at https://www.as14061.net
Comment:        
Comment:        Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref:            https://rdap.arin.net/registry/ip/206.81.0.0



OrgName:        DigitalOcean, LLC
OrgId:          DO-13
Address:        105 Edgeview Drive, Suite 425
City:           Broomfield
StateProv:      CO
PostalCode:     80021
Country:        US
RegDate:        2012-05-14
Updated:        2025-04-11
Ref:            https://rdap.arin.net/registry/entity/DO-13


OrgNOCHandle: NOC32014-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-646-827-4366 
OrgNOCEmail:  noc@digitalocean.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN

OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName:   DigitalOcean Abuse
OrgAbusePhone:  +1-646-827-4366 
OrgAbuseEmail:  abuse@digitalocean.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/DIGIT19-ARIN

OrgTechHandle: NOC32014-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-646-827-4366 
OrgTechEmail:  noc@digitalocean.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 206.81.11.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7786
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;206.81.11.95.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040500 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 05 19:30:11 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 95.11.81.206.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 95.11.81.206.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.193.174.234 attackbots
B: Abusive ssh attack
2020-04-04 04:58:05
111.40.217.92 attackspam
Apr  3 16:57:00 v22018086721571380 sshd[2249]: Failed password for invalid user lg from 111.40.217.92 port 33469 ssh2
2020-04-04 04:50:05
180.76.60.144 attackspambots
Apr  3 16:01:52 NPSTNNYC01T sshd[9628]: Failed password for root from 180.76.60.144 port 38872 ssh2
Apr  3 16:04:47 NPSTNNYC01T sshd[9837]: Failed password for root from 180.76.60.144 port 58498 ssh2
...
2020-04-04 04:31:42
171.232.188.196 attackbots
Invalid user user from 171.232.188.196 port 54263
2020-04-04 04:34:11
93.100.64.141 attackbots
Invalid user wf from 93.100.64.141 port 60724
2020-04-04 05:02:10
106.54.142.196 attackspam
Invalid user tah from 106.54.142.196 port 38524
2020-04-04 04:52:53
106.13.216.231 attack
Apr  3 22:11:45 meumeu sshd[29624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.216.231 
Apr  3 22:11:47 meumeu sshd[29624]: Failed password for invalid user ed from 106.13.216.231 port 49310 ssh2
Apr  3 22:14:00 meumeu sshd[29947]: Failed password for root from 106.13.216.231 port 52626 ssh2
...
2020-04-04 04:54:36
140.143.56.61 attackbotsspam
Invalid user berit from 140.143.56.61 port 46772
2020-04-04 04:37:19
119.90.51.171 attackspam
Apr  3 13:00:12 ip-172-31-62-245 sshd\[1798\]: Failed password for root from 119.90.51.171 port 53360 ssh2\
Apr  3 13:02:49 ip-172-31-62-245 sshd\[1826\]: Invalid user kazutoyo from 119.90.51.171\
Apr  3 13:02:51 ip-172-31-62-245 sshd\[1826\]: Failed password for invalid user kazutoyo from 119.90.51.171 port 42224 ssh2\
Apr  3 13:05:31 ip-172-31-62-245 sshd\[1846\]: Failed password for root from 119.90.51.171 port 59320 ssh2\
Apr  3 13:08:10 ip-172-31-62-245 sshd\[1862\]: Failed password for root from 119.90.51.171 port 48177 ssh2\
2020-04-04 04:44:54
106.12.150.36 attackspambots
Repeated brute force against a port
2020-04-04 04:56:50
116.196.121.227 attackbotsspam
Invalid user nds from 116.196.121.227 port 59136
2020-04-04 04:46:17
51.254.143.190 attackbotsspam
Apr  3 22:37:21 ewelt sshd[8042]: Invalid user test from 51.254.143.190 port 42630
Apr  3 22:37:21 ewelt sshd[8042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.143.190
Apr  3 22:37:21 ewelt sshd[8042]: Invalid user test from 51.254.143.190 port 42630
Apr  3 22:37:23 ewelt sshd[8042]: Failed password for invalid user test from 51.254.143.190 port 42630 ssh2
...
2020-04-04 05:09:36
150.109.63.204 attackbotsspam
Invalid user ftptest from 150.109.63.204 port 54682
2020-04-04 04:36:33
51.83.77.154 attackbots
Automatic report - SSH Brute-Force Attack
2020-04-04 05:10:44
101.96.113.50 attackbots
Apr  3 23:12:01 ift sshd\[63481\]: Failed password for root from 101.96.113.50 port 52198 ssh2Apr  3 23:16:20 ift sshd\[64579\]: Invalid user ml from 101.96.113.50Apr  3 23:16:22 ift sshd\[64579\]: Failed password for invalid user ml from 101.96.113.50 port 58920 ssh2Apr  3 23:20:47 ift sshd\[65110\]: Invalid user ml from 101.96.113.50Apr  3 23:20:49 ift sshd\[65110\]: Failed password for invalid user ml from 101.96.113.50 port 37406 ssh2
...
2020-04-04 05:00:38

Recently Reported IPs

2606:4700:10::6816:1257 2606:4700:10::ac43:1765 2606:4700:10::6816:4038 2606:4700:10::6814:7150
2606:4700:10::6814:4840 2606:4700:10::6814:9944 2606:4700:10::6816:2226 109.167.82.147
2606:4700:10::6814:8252 2606:4700:10::6814:9092 2606:4700:10::6814:5263 2606:4700:20::681a:483
183.42.137.1 190.194.63.17 190.194.63.22 180.153.236.221
60.195.164.224 109.162.246.145 2606:4700:10::6814:7400 2606:4700:10::6814:5598