Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.125.159.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54884
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.125.159.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:25:38 CST 2025
;; MSG SIZE  rcvd: 106
Host info
55.159.125.81.in-addr.arpa domain name pointer host-81-125-159-55.business.telecomitalia.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.159.125.81.in-addr.arpa	name = host-81-125-159-55.business.telecomitalia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.128.151.105 attackspambots
May 26 17:38:47 xeon postfix/smtpd[50641]: warning: unknown[177.128.151.105]: SASL PLAIN authentication failed: authentication failure
2020-05-27 04:51:04
124.115.220.123 attack
firewall-block, port(s): 1433/tcp
2020-05-27 04:33:31
37.49.226.32 attackspam
May 26 **REMOVED** sshd\[24020\]: Invalid user "root from 37.49.226.32
May 26 **REMOVED** sshd\[24022\]: Invalid user "default from 37.49.226.32
May 26 **REMOVED** sshd\[24024\]: Invalid user "support from 37.49.226.32
2020-05-27 04:29:59
51.38.186.180 attackbotsspam
May 26 22:35:23 pornomens sshd\[24339\]: Invalid user low from 51.38.186.180 port 50839
May 26 22:35:23 pornomens sshd\[24339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180
May 26 22:35:24 pornomens sshd\[24339\]: Failed password for invalid user low from 51.38.186.180 port 50839 ssh2
...
2020-05-27 04:48:06
222.186.169.194 attackspambots
2020-05-26T20:35:18.170958abusebot-4.cloudsearch.cf sshd[15840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
2020-05-26T20:35:20.345048abusebot-4.cloudsearch.cf sshd[15840]: Failed password for root from 222.186.169.194 port 46694 ssh2
2020-05-26T20:35:23.491476abusebot-4.cloudsearch.cf sshd[15840]: Failed password for root from 222.186.169.194 port 46694 ssh2
2020-05-26T20:35:18.170958abusebot-4.cloudsearch.cf sshd[15840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
2020-05-26T20:35:20.345048abusebot-4.cloudsearch.cf sshd[15840]: Failed password for root from 222.186.169.194 port 46694 ssh2
2020-05-26T20:35:23.491476abusebot-4.cloudsearch.cf sshd[15840]: Failed password for root from 222.186.169.194 port 46694 ssh2
2020-05-26T20:35:18.170958abusebot-4.cloudsearch.cf sshd[15840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 
...
2020-05-27 04:54:49
197.235.10.121 attackbots
May 26 22:37:29 hosting sshd[10459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.235.10.121  user=root
May 26 22:37:31 hosting sshd[10459]: Failed password for root from 197.235.10.121 port 33900 ssh2
...
2020-05-27 05:00:51
192.144.129.98 attackbots
Invalid user kfranklin from 192.144.129.98 port 52866
2020-05-27 05:01:34
103.29.142.25 attackspambots
 TCP (SYN) 103.29.142.25:52094 -> port 445, len 52
2020-05-27 04:46:39
34.96.203.141 attackbotsspam
2020-05-26T18:34:11.326485abusebot-7.cloudsearch.cf sshd[29372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.203.96.34.bc.googleusercontent.com  user=root
2020-05-26T18:34:13.294352abusebot-7.cloudsearch.cf sshd[29372]: Failed password for root from 34.96.203.141 port 56044 ssh2
2020-05-26T18:39:39.565005abusebot-7.cloudsearch.cf sshd[29652]: Invalid user test from 34.96.203.141 port 37908
2020-05-26T18:39:39.570555abusebot-7.cloudsearch.cf sshd[29652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.203.96.34.bc.googleusercontent.com
2020-05-26T18:39:39.565005abusebot-7.cloudsearch.cf sshd[29652]: Invalid user test from 34.96.203.141 port 37908
2020-05-26T18:39:41.200768abusebot-7.cloudsearch.cf sshd[29652]: Failed password for invalid user test from 34.96.203.141 port 37908 ssh2
2020-05-26T18:43:46.746093abusebot-7.cloudsearch.cf sshd[29999]: pam_unix(sshd:auth): authentication failure; lognam
...
2020-05-27 05:00:29
185.116.161.213 attackspambots
eintrachtkultkellerfulda.de 185.116.161.213 [26/May/2020:18:07:40 +0200] "POST /wp-login.php HTTP/1.1" 200 2420 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
eintrachtkultkellerfulda.de 185.116.161.213 [26/May/2020:18:07:40 +0200] "POST /xmlrpc.php HTTP/1.1" 200 426 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-27 04:44:18
89.134.126.89 attackbots
Failed password for invalid user dev from 89.134.126.89 port 35738 ssh2
2020-05-27 04:41:17
45.141.84.44 attackspam
Port scan
2020-05-27 04:53:13
176.31.182.79 attack
May 26 19:36:41 ip-172-31-61-156 sshd[14685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.79  user=root
May 26 19:36:43 ip-172-31-61-156 sshd[14685]: Failed password for root from 176.31.182.79 port 51222 ssh2
May 26 19:36:41 ip-172-31-61-156 sshd[14685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.79  user=root
May 26 19:36:43 ip-172-31-61-156 sshd[14685]: Failed password for root from 176.31.182.79 port 51222 ssh2
May 26 19:39:16 ip-172-31-61-156 sshd[14927]: Invalid user half from 176.31.182.79
...
2020-05-27 04:33:16
213.108.105.71 attackbotsspam
(sshd) Failed SSH login from 213.108.105.71 (NL/Netherlands/tor-exit-readme.jongedemocraten.nl): 5 in the last 3600 secs
2020-05-27 04:43:20
191.252.222.199 attackbotsspam
Lines containing failures of 191.252.222.199
May 26 20:04:56 shared10 sshd[31962]: Invalid user lord from 191.252.222.199 port 49826
May 26 20:04:56 shared10 sshd[31962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.222.199
May 26 20:04:58 shared10 sshd[31962]: Failed password for invalid user lord from 191.252.222.199 port 49826 ssh2
May 26 20:04:58 shared10 sshd[31962]: Received disconnect from 191.252.222.199 port 49826:11: Bye Bye [preauth]
May 26 20:04:58 shared10 sshd[31962]: Disconnected from invalid user lord 191.252.222.199 port 49826 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=191.252.222.199
2020-05-27 04:30:18

Recently Reported IPs

195.48.169.18 201.243.146.84 77.48.239.203 17.88.9.50
188.253.51.203 193.194.122.197 46.215.62.87 5.118.148.84
165.200.202.87 227.98.170.251 6.105.30.103 46.34.124.224
16.102.241.75 244.148.170.100 94.155.34.162 68.2.39.224
18.222.228.49 28.39.163.58 7.172.66.251 133.169.210.44