Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.104.130.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.104.130.153.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 16:03:38 CST 2025
;; MSG SIZE  rcvd: 107
Host info
153.130.104.81.in-addr.arpa domain name pointer gill-20-b2-v4wan-170022-cust664.vm41.cable.virginm.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
153.130.104.81.in-addr.arpa	name = gill-20-b2-v4wan-170022-cust664.vm41.cable.virginm.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.251.26.219 attackspam
1582032099 - 02/18/2020 20:21:39 Host: 118.251.26.219/118.251.26.219 Port: 8080 UDP Blocked
...
2020-02-19 03:03:09
106.12.92.65 attack
Feb 18 05:21:49 mockhub sshd[16136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.92.65
Feb 18 05:21:51 mockhub sshd[16136]: Failed password for invalid user defectus from 106.12.92.65 port 41246 ssh2
...
2020-02-19 02:53:18
103.103.146.181 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-19 02:52:03
81.252.136.89 attack
Feb 18 15:10:58 ourumov-web sshd\[32081\]: Invalid user admin from 81.252.136.89 port 45833
Feb 18 15:10:58 ourumov-web sshd\[32081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.252.136.89
Feb 18 15:10:59 ourumov-web sshd\[32081\]: Failed password for invalid user admin from 81.252.136.89 port 45833 ssh2
...
2020-02-19 02:47:37
59.127.107.18 attackbots
port scan and connect, tcp 23 (telnet)
2020-02-19 03:07:11
103.103.212.162 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-19 02:47:11
198.98.53.133 attack
Feb 18 13:17:15 debian sshd[21243]: Unable to negotiate with 198.98.53.133 port 59556: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Feb 18 13:17:15 debian sshd[21245]: Unable to negotiate with 198.98.53.133 port 59635: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
...
2020-02-19 02:45:44
219.159.49.58 attackbots
Port 1433 Scan
2020-02-19 03:09:59
89.248.172.85 attack
Port 2009 scan denied
2020-02-19 02:37:44
192.241.236.41 attack
Port 8005 scan denied
2020-02-19 02:34:38
45.134.179.15 attackspambots
Port 9833 scan denied
2020-02-19 02:39:35
223.31.174.4 attackbots
20/2/18@08:21:53: FAIL: Alarm-Network address from=223.31.174.4
20/2/18@08:21:53: FAIL: Alarm-Network address from=223.31.174.4
...
2020-02-19 02:49:29
45.144.235.50 attack
missing rdns
2020-02-19 03:10:19
118.100.116.155 attackbots
Feb 18 15:50:48 web8 sshd\[21077\]: Invalid user vanessa from 118.100.116.155
Feb 18 15:50:48 web8 sshd\[21077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.100.116.155
Feb 18 15:50:49 web8 sshd\[21077\]: Failed password for invalid user vanessa from 118.100.116.155 port 36938 ssh2
Feb 18 15:55:42 web8 sshd\[23572\]: Invalid user postgres from 118.100.116.155
Feb 18 15:55:42 web8 sshd\[23572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.100.116.155
2020-02-19 02:44:00
122.51.30.252 attackspam
Feb 18 16:36:07 h1745522 sshd[28222]: Invalid user partners from 122.51.30.252 port 37340
Feb 18 16:36:07 h1745522 sshd[28222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.30.252
Feb 18 16:36:07 h1745522 sshd[28222]: Invalid user partners from 122.51.30.252 port 37340
Feb 18 16:36:09 h1745522 sshd[28222]: Failed password for invalid user partners from 122.51.30.252 port 37340 ssh2
Feb 18 16:39:27 h1745522 sshd[28398]: Invalid user !QAZ2wsx from 122.51.30.252 port 56118
Feb 18 16:39:27 h1745522 sshd[28398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.30.252
Feb 18 16:39:27 h1745522 sshd[28398]: Invalid user !QAZ2wsx from 122.51.30.252 port 56118
Feb 18 16:39:28 h1745522 sshd[28398]: Failed password for invalid user !QAZ2wsx from 122.51.30.252 port 56118 ssh2
Feb 18 16:42:34 h1745522 sshd[28518]: Invalid user qwerty from 122.51.30.252 port 46650
...
2020-02-19 02:36:21

Recently Reported IPs

103.58.212.150 63.236.170.43 95.214.141.31 254.157.134.95
225.41.190.161 91.234.242.242 122.36.41.221 73.117.71.204
133.244.165.9 127.97.236.220 62.145.150.7 148.35.145.24
205.21.35.52 233.114.132.112 218.41.197.130 162.112.97.253
87.147.66.81 55.184.31.237 57.34.143.251 249.129.82.121