Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: Daimler AG

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.68.77.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39539
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;53.68.77.81.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 15 18:59:42 CST 2019
;; MSG SIZE  rcvd: 115

Host info
Host 81.77.68.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 81.77.68.53.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
45.142.120.36 attackspam
2020-08-31 08:07:42 dovecot_login authenticator failed for \(User\) \[45.142.120.36\]: 535 Incorrect authentication data \(set_id=sky@org.ua\)2020-08-31 08:08:20 dovecot_login authenticator failed for \(User\) \[45.142.120.36\]: 535 Incorrect authentication data \(set_id=hod@org.ua\)2020-08-31 08:09:00 dovecot_login authenticator failed for \(User\) \[45.142.120.36\]: 535 Incorrect authentication data \(set_id=vibe@org.ua\)
...
2020-08-31 13:13:45
182.137.60.207 attack
spam (f2b h2)
2020-08-31 13:21:33
91.245.30.71 attackspambots
Brute force attempt
2020-08-31 13:04:59
200.86.184.192 attackspam
200.86.184.192 - - \[31/Aug/2020:06:50:59 +0300\] "POST /wordpress/xmlrpc.php HTTP/1.1" 200 426 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" "-"
200.86.184.192 - - \[31/Aug/2020:06:57:49 +0300\] "POST /wordpress/xmlrpc.php HTTP/1.1" 200 426 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" "-"
...
2020-08-31 13:24:04
1.192.94.61 attack
Aug 31 06:17:30 v22019038103785759 sshd\[30234\]: Invalid user andres from 1.192.94.61 port 48770
Aug 31 06:17:30 v22019038103785759 sshd\[30234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.192.94.61
Aug 31 06:17:32 v22019038103785759 sshd\[30234\]: Failed password for invalid user andres from 1.192.94.61 port 48770 ssh2
Aug 31 06:22:30 v22019038103785759 sshd\[30655\]: Invalid user git from 1.192.94.61 port 47500
Aug 31 06:22:30 v22019038103785759 sshd\[30655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.192.94.61
...
2020-08-31 13:30:03
51.91.110.170 attackspam
2020-08-31T07:13:49.505368lavrinenko.info sshd[10052]: Failed password for root from 51.91.110.170 port 33766 ssh2
2020-08-31T07:17:38.457586lavrinenko.info sshd[10152]: Invalid user com from 51.91.110.170 port 41408
2020-08-31T07:17:38.470711lavrinenko.info sshd[10152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.110.170
2020-08-31T07:17:38.457586lavrinenko.info sshd[10152]: Invalid user com from 51.91.110.170 port 41408
2020-08-31T07:17:40.187296lavrinenko.info sshd[10152]: Failed password for invalid user com from 51.91.110.170 port 41408 ssh2
...
2020-08-31 12:55:45
181.65.252.10 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-31T04:20:36Z and 2020-08-31T04:31:08Z
2020-08-31 13:38:06
51.89.157.100 attack
B: WP plugin attack
2020-08-31 13:30:30
218.73.136.244 attackbots
Aug 31 07:06:18 buvik sshd[14182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.73.136.244
Aug 31 07:06:21 buvik sshd[14182]: Failed password for invalid user cosmos from 218.73.136.244 port 48038 ssh2
Aug 31 07:09:21 buvik sshd[14569]: Invalid user chloe from 218.73.136.244
...
2020-08-31 13:19:34
5.188.62.12 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-31T02:16:50Z and 2020-08-31T03:58:16Z
2020-08-31 13:08:39
115.239.38.187 attack
20/8/30@23:57:34: FAIL: Alarm-Intrusion address from=115.239.38.187
...
2020-08-31 13:39:05
119.45.5.31 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-31 13:13:17
37.236.126.217 attack
(smtpauth) Failed SMTP AUTH login from 37.236.126.217 (IQ/Iraq/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-31 08:28:05 plain authenticator failed for ([37.236.126.217]) [37.236.126.217]: 535 Incorrect authentication data (set_id=fd2302@nazeranyekta.com)
2020-08-31 13:12:35
192.241.206.11 attackbots
Honeypot hit.
2020-08-31 13:24:24
192.241.239.82 attack
firewall-block, port(s): 1900/udp
2020-08-31 13:20:09

Recently Reported IPs

61.179.106.184 58.116.233.88 210.138.79.101 47.188.14.56
164.231.183.247 13.126.253.179 165.157.227.214 142.139.216.60
218.151.10.124 118.137.204.97 176.98.41.90 121.208.102.52
180.117.229.54 131.153.31.59 1.250.243.253 73.68.194.29
118.163.143.170 198.108.66.162 198.108.66.175 116.228.33.70