Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
206.81.2.75 attackspam
Aug  5 22:38:11 vps639187 sshd\[17010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.2.75  user=root
Aug  5 22:38:12 vps639187 sshd\[17010\]: Failed password for root from 206.81.2.75 port 39814 ssh2
Aug  5 22:41:30 vps639187 sshd\[17140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.2.75  user=root
...
2020-08-06 04:48:50
206.81.2.75 attack
Aug  5 22:01:53 vps639187 sshd\[15959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.2.75  user=root
Aug  5 22:01:55 vps639187 sshd\[15959\]: Failed password for root from 206.81.2.75 port 51090 ssh2
Aug  5 22:05:04 vps639187 sshd\[16108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.2.75  user=root
...
2020-08-06 04:18:15
206.81.2.32 attackbots
$f2bV_matches
2020-07-26 20:22:03
206.81.2.177 attack
.
2020-05-28 04:03:47
206.81.2.75 attackspambots
2020-05-13T09:02:47.502068shield sshd\[9789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.2.75  user=root
2020-05-13T09:02:49.979980shield sshd\[9789\]: Failed password for root from 206.81.2.75 port 33706 ssh2
2020-05-13T09:05:53.053402shield sshd\[10826\]: Invalid user abc from 206.81.2.75 port 36610
2020-05-13T09:05:53.056901shield sshd\[10826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.2.75
2020-05-13T09:05:54.735888shield sshd\[10826\]: Failed password for invalid user abc from 206.81.2.75 port 36610 ssh2
2020-05-13 17:12:18
206.81.28.128 attackbotsspam
Mar 31 05:55:05 debian-2gb-nbg1-2 kernel: \[7885960.187609\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=206.81.28.128 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=55 ID=0 DF PROTO=TCP SPT=22 DPT=62856 WINDOW=29200 RES=0x00 ACK SYN URGP=0
2020-03-31 12:54:20
206.81.24.126 attack
$f2bV_matches
2020-02-27 03:58:12
206.81.24.126 attackspam
Feb 11 11:05:19 lukav-desktop sshd\[24191\]: Invalid user bzh from 206.81.24.126
Feb 11 11:05:19 lukav-desktop sshd\[24191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.24.126
Feb 11 11:05:21 lukav-desktop sshd\[24191\]: Failed password for invalid user bzh from 206.81.24.126 port 37104 ssh2
Feb 11 11:07:02 lukav-desktop sshd\[29814\]: Invalid user say from 206.81.24.126
Feb 11 11:07:02 lukav-desktop sshd\[29814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.24.126
2020-02-11 17:07:48
206.81.29.166 attackbots
Automatic report - Banned IP Access
2020-02-10 20:48:22
206.81.24.126 attackspambots
Jan 21 23:32:19 sd-53420 sshd\[6665\]: User root from 206.81.24.126 not allowed because none of user's groups are listed in AllowGroups
Jan 21 23:32:19 sd-53420 sshd\[6665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.24.126  user=root
Jan 21 23:32:21 sd-53420 sshd\[6665\]: Failed password for invalid user root from 206.81.24.126 port 53252 ssh2
Jan 21 23:36:19 sd-53420 sshd\[7301\]: Invalid user wen from 206.81.24.126
Jan 21 23:36:19 sd-53420 sshd\[7301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.24.126
...
2020-01-22 06:40:16
206.81.24.126 attack
Unauthorized connection attempt detected from IP address 206.81.24.126 to port 2220 [J]
2020-01-22 00:12:46
206.81.24.126 attack
Unauthorized connection attempt detected from IP address 206.81.24.126 to port 2220 [J]
2020-01-19 21:23:01
206.81.23.209 attackbotsspam
14.01.2020 18:00:54 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-01-15 02:13:02
206.81.24.126 attackbotsspam
Unauthorized connection attempt detected from IP address 206.81.24.126 to port 2220 [J]
2020-01-14 18:19:11
206.81.24.126 attackspam
SSH bruteforce (Triggered fail2ban)
2020-01-10 02:22:47
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 206.81.2.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45555
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;206.81.2.66.			IN	A

;; AUTHORITY SECTION:
.			386	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 00:59:28 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 66.2.81.206.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.2.81.206.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.13.191.9 attackbots
Unauthorized connection attempt detected from IP address 59.13.191.9 to port 4567
2020-01-06 00:34:07
201.196.17.50 attackspam
Unauthorized connection attempt detected from IP address 201.196.17.50 to port 4567 [J]
2020-01-06 00:41:36
175.212.246.225 attackbots
Unauthorized connection attempt detected from IP address 175.212.246.225 to port 23 [J]
2020-01-06 00:50:46
218.153.113.217 attackbotsspam
Unauthorized connection attempt detected from IP address 218.153.113.217 to port 5555 [J]
2020-01-06 00:40:56
162.211.130.151 attack
Unauthorized connection attempt detected from IP address 162.211.130.151 to port 23
2020-01-06 00:20:32
188.119.24.209 attackspambots
Unauthorized connection attempt detected from IP address 188.119.24.209 to port 23
2020-01-06 00:46:14
167.71.200.175 attackspam
Unauthorized connection attempt detected from IP address 167.71.200.175 to port 8545 [J]
2020-01-06 00:51:46
73.15.64.171 attackspam
Unauthorized connection attempt detected from IP address 73.15.64.171 to port 9000
2020-01-06 00:31:36
200.194.33.107 attackbots
Unauthorized connection attempt detected from IP address 200.194.33.107 to port 23
2020-01-06 00:42:31
63.240.250.44 attackspam
Unauthorized connection attempt detected from IP address 63.240.250.44 to port 8080
2020-01-06 00:32:42
192.99.245.147 attackspam
Jan  5 05:00:15 hanapaa sshd\[9796\]: Invalid user staff2 from 192.99.245.147
Jan  5 05:00:15 hanapaa sshd\[9796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.ip-192-99-245.net
Jan  5 05:00:17 hanapaa sshd\[9796\]: Failed password for invalid user staff2 from 192.99.245.147 port 43894 ssh2
Jan  5 05:02:49 hanapaa sshd\[10037\]: Invalid user ubnt from 192.99.245.147
Jan  5 05:02:49 hanapaa sshd\[10037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.ip-192-99-245.net
2020-01-06 00:11:13
194.208.80.3 attackspambots
Unauthorized connection attempt detected from IP address 194.208.80.3 to port 8080
2020-01-06 00:10:23
168.228.14.37 attackspam
Unauthorized connection attempt detected from IP address 168.228.14.37 to port 8080
2020-01-06 00:51:14
118.38.81.19 attackbotsspam
Unauthorized connection attempt detected from IP address 118.38.81.19 to port 5555 [J]
2020-01-06 00:22:52
187.178.68.130 attackspam
Unauthorized connection attempt detected from IP address 187.178.68.130 to port 23
2020-01-06 00:47:26

Recently Reported IPs

206.81.167.20 206.81.16.24 206.81.22.254 206.81.18.9
206.81.22.158 206.81.27.46 206.81.7.81 206.81.30.230
206.81.6.198 206.81.6.225 206.82.133.162 206.81.25.142
206.81.25.53 206.82.192.172 206.81.8.134 206.83.162.175
206.83.83.78 206.83.83.69 206.83.88.211 206.84.65.188