Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.107.218.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30236
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.107.218.54.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 20:01:48 CST 2025
;; MSG SIZE  rcvd: 106
Host info
54.218.107.81.in-addr.arpa domain name pointer cos2-06-b2-v4wan-171663-cust53.vm10.cable.virginm.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.218.107.81.in-addr.arpa	name = cos2-06-b2-v4wan-171663-cust53.vm10.cable.virginm.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
171.229.230.249 attack
1594439550 - 07/11/2020 05:52:30 Host: 171.229.230.249/171.229.230.249 Port: 445 TCP Blocked
2020-07-11 16:37:36
222.186.180.147 attack
Jul 11 10:38:01 zooi sshd[19456]: Failed password for root from 222.186.180.147 port 20824 ssh2
Jul 11 10:38:05 zooi sshd[19456]: Failed password for root from 222.186.180.147 port 20824 ssh2
...
2020-07-11 16:41:13
203.213.66.170 attackbots
Jul 11 06:08:57 rush sshd[11007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.213.66.170
Jul 11 06:08:58 rush sshd[11007]: Failed password for invalid user centos from 203.213.66.170 port 41692 ssh2
Jul 11 06:12:17 rush sshd[11158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.213.66.170
...
2020-07-11 17:07:45
117.103.168.204 attackbotsspam
Jul 11 08:52:30 v22019038103785759 sshd\[20606\]: Invalid user neena from 117.103.168.204 port 49342
Jul 11 08:52:30 v22019038103785759 sshd\[20606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.103.168.204
Jul 11 08:52:32 v22019038103785759 sshd\[20606\]: Failed password for invalid user neena from 117.103.168.204 port 49342 ssh2
Jul 11 08:56:06 v22019038103785759 sshd\[20740\]: Invalid user bdc from 117.103.168.204 port 45224
Jul 11 08:56:06 v22019038103785759 sshd\[20740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.103.168.204
...
2020-07-11 16:45:44
144.217.70.190 attackspam
www.fahrlehrerfortbildung-hessen.de 144.217.70.190 [11/Jul/2020:09:08:31 +0200] "POST /wp-login.php HTTP/1.1" 200 6114 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
www.fahrlehrerfortbildung-hessen.de 144.217.70.190 [11/Jul/2020:09:08:32 +0200] "POST /wp-login.php HTTP/1.1" 200 6109 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-11 17:09:06
104.248.158.95 attack
WordPress login Brute force / Web App Attack on client site.
2020-07-11 16:44:24
151.80.67.240 attack
Jul 11 10:11:44 nas sshd[10238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.67.240  user=admin
Jul 11 10:11:46 nas sshd[10238]: Failed password for invalid user admin from 151.80.67.240 port 56805 ssh2
Jul 11 10:20:56 nas sshd[10678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.67.240 
...
2020-07-11 16:39:09
46.38.148.14 attackbots
Jul 11 10:04:49 websrv1.aknwsrv.net postfix/smtpd[3205181]: warning: unknown[46.38.148.14]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 11 10:05:10 websrv1.aknwsrv.net postfix/smtpd[3205181]: warning: unknown[46.38.148.14]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 11 10:05:30 websrv1.aknwsrv.net postfix/smtpd[3218433]: warning: unknown[46.38.148.14]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 11 10:05:51 websrv1.aknwsrv.net postfix/smtpd[3205181]: warning: unknown[46.38.148.14]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 11 10:06:11 websrv1.aknwsrv.net postfix/smtpd[3218433]: warning: unknown[46.38.148.14]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-11 16:50:42
216.155.93.77 attackspam
2020-07-11T04:42:24.430003na-vps210223 sshd[3027]: Invalid user liuguofeng from 216.155.93.77 port 42072
2020-07-11T04:42:24.434721na-vps210223 sshd[3027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.155.93.77
2020-07-11T04:42:24.430003na-vps210223 sshd[3027]: Invalid user liuguofeng from 216.155.93.77 port 42072
2020-07-11T04:42:26.047034na-vps210223 sshd[3027]: Failed password for invalid user liuguofeng from 216.155.93.77 port 42072 ssh2
2020-07-11T04:44:45.118035na-vps210223 sshd[9446]: Invalid user lovey from 216.155.93.77 port 43128
...
2020-07-11 16:51:21
52.249.250.188 attackbots
Jul 11 05:51:58 debian-2gb-nbg1-2 kernel: \[16698103.721390\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=52.249.250.188 DST=195.201.40.59 LEN=429 TOS=0x00 PREC=0x00 TTL=43 ID=55367 DF PROTO=UDP SPT=5071 DPT=5060 LEN=409
2020-07-11 17:04:13
161.117.7.233 attackspam
Jul 11 07:52:43 lukav-desktop sshd\[1448\]: Invalid user sex from 161.117.7.233
Jul 11 07:52:43 lukav-desktop sshd\[1448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.117.7.233
Jul 11 07:52:45 lukav-desktop sshd\[1448\]: Failed password for invalid user sex from 161.117.7.233 port 41910 ssh2
Jul 11 07:54:31 lukav-desktop sshd\[1458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.117.7.233  user=lp
Jul 11 07:54:33 lukav-desktop sshd\[1458\]: Failed password for lp from 161.117.7.233 port 52174 ssh2
2020-07-11 17:02:03
142.4.6.212 attack
142.4.6.212 - - [11/Jul/2020:10:54:55 +0200] "GET /wp-login.php HTTP/1.1" 200 5990 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.6.212 - - [11/Jul/2020:10:54:58 +0200] "POST /wp-login.php HTTP/1.1" 200 6220 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.6.212 - - [11/Jul/2020:10:55:00 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-11 17:05:04
149.56.19.4 attack
149.56.19.4 - - [11/Jul/2020:10:00:37 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.56.19.4 - - [11/Jul/2020:10:00:48 +0100] "POST /wp-login.php HTTP/1.1" 200 1929 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.56.19.4 - - [11/Jul/2020:10:00:53 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-11 17:02:19
185.39.10.27 attackbots
07/11/2020-05:04:49.628691 185.39.10.27 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-11 17:10:22
207.186.160.22 attack
20 attempts against mh-ssh on mist
2020-07-11 16:35:41

Recently Reported IPs

236.213.105.2 202.175.30.242 47.205.71.0 209.4.189.193
227.53.35.250 188.207.104.183 18.76.44.117 125.253.108.52
223.204.188.91 85.172.248.181 168.32.7.242 191.101.167.64
197.210.84.30 86.153.80.218 113.80.56.113 86.182.250.189
129.166.114.203 245.6.93.223 30.38.171.31 70.165.206.123