Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.12.162.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26643
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.12.162.214.			IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102900 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 00:11:06 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 214.162.12.81.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.162.12.81.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
101.78.240.10 attackspam
Dec  2 11:00:51 srv01 sshd[28084]: Invalid user hammarin from 101.78.240.10 port 34756
Dec  2 11:00:51 srv01 sshd[28084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.240.10
Dec  2 11:00:51 srv01 sshd[28084]: Invalid user hammarin from 101.78.240.10 port 34756
Dec  2 11:00:54 srv01 sshd[28084]: Failed password for invalid user hammarin from 101.78.240.10 port 34756 ssh2
Dec  2 11:09:59 srv01 sshd[28900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.240.10  user=root
Dec  2 11:10:01 srv01 sshd[28900]: Failed password for root from 101.78.240.10 port 46070 ssh2
...
2019-12-02 18:20:28
159.65.109.148 attack
Dec  2 15:40:38 vibhu-HP-Z238-Microtower-Workstation sshd\[12376\]: Invalid user manrique from 159.65.109.148
Dec  2 15:40:38 vibhu-HP-Z238-Microtower-Workstation sshd\[12376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.109.148
Dec  2 15:40:39 vibhu-HP-Z238-Microtower-Workstation sshd\[12376\]: Failed password for invalid user manrique from 159.65.109.148 port 53944 ssh2
Dec  2 15:46:01 vibhu-HP-Z238-Microtower-Workstation sshd\[13637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.109.148  user=sshd
Dec  2 15:46:03 vibhu-HP-Z238-Microtower-Workstation sshd\[13637\]: Failed password for sshd from 159.65.109.148 port 36636 ssh2
...
2019-12-02 18:25:45
36.32.16.162 attackbotsspam
1433/tcp 1433/tcp
[2019-10-25/12-02]2pkt
2019-12-02 18:19:10
185.198.242.33 attack
TCP Port Scanning
2019-12-02 18:37:56
113.62.176.97 attackspam
Dec  2 00:11:38 php1 sshd\[15148\]: Invalid user admin from 113.62.176.97
Dec  2 00:11:38 php1 sshd\[15148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.62.176.97
Dec  2 00:11:40 php1 sshd\[15148\]: Failed password for invalid user admin from 113.62.176.97 port 63199 ssh2
Dec  2 00:18:43 php1 sshd\[16044\]: Invalid user stroub from 113.62.176.97
Dec  2 00:18:43 php1 sshd\[16044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.62.176.97
2019-12-02 18:23:53
40.114.246.252 attackbotsspam
$f2bV_matches
2019-12-02 18:08:27
234.215.33.26 attack
DoS.Generic.PingOfDeath
2019-12-02 18:32:47
118.97.77.114 attackspambots
Dec  2 14:42:07 gw1 sshd[16755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.77.114
Dec  2 14:42:09 gw1 sshd[16755]: Failed password for invalid user sudhakar from 118.97.77.114 port 44220 ssh2
...
2019-12-02 18:05:42
113.162.244.120 attack
445/tcp 445/tcp 445/tcp
[2019-11-20/12-02]3pkt
2019-12-02 18:23:32
221.143.48.143 attackspambots
Dec  2 00:11:39 tdfoods sshd\[11271\]: Invalid user oracle from 221.143.48.143
Dec  2 00:11:39 tdfoods sshd\[11271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.143.48.143
Dec  2 00:11:41 tdfoods sshd\[11271\]: Failed password for invalid user oracle from 221.143.48.143 port 19810 ssh2
Dec  2 00:18:47 tdfoods sshd\[11972\]: Invalid user ahavi from 221.143.48.143
Dec  2 00:18:47 tdfoods sshd\[11972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.143.48.143
2019-12-02 18:31:18
62.234.106.199 attackbots
2019-12-02T09:40:40.889211ns386461 sshd\[9973\]: Invalid user dolid from 62.234.106.199 port 49310
2019-12-02T09:40:40.893843ns386461 sshd\[9973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.106.199
2019-12-02T09:40:42.789248ns386461 sshd\[9973\]: Failed password for invalid user dolid from 62.234.106.199 port 49310 ssh2
2019-12-02T09:54:24.967568ns386461 sshd\[21789\]: Invalid user koti from 62.234.106.199 port 41808
2019-12-02T09:54:24.972147ns386461 sshd\[21789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.106.199
...
2019-12-02 18:17:16
196.218.141.126 attack
$f2bV_matches
2019-12-02 18:31:32
104.236.244.98 attackspambots
2019-12-02T10:00:04.195052abusebot-2.cloudsearch.cf sshd\[25684\]: Invalid user mysql from 104.236.244.98 port 58592
2019-12-02 18:12:55
61.7.231.227 attackbots
1433/tcp 445/tcp...
[2019-11-09/12-02]6pkt,2pt.(tcp)
2019-12-02 18:39:32
172.81.248.249 attackbotsspam
2019-12-02T10:31:58.885592abusebot.cloudsearch.cf sshd\[14850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.248.249  user=root
2019-12-02 18:42:22

Recently Reported IPs

34.7.19.199 27.246.39.172 147.201.41.17 240.146.101.100
33.166.165.140 83.110.24.103 61.58.9.60 246.198.156.209
101.201.227.190 16.56.211.186 54.194.129.28 88.117.156.153
147.250.215.39 46.170.51.226 86.122.55.15 188.244.64.214
42.203.62.0 1.49.183.17 18.139.117.61 161.66.11.69