Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.135.125.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.135.125.116.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:24:23 CST 2025
;; MSG SIZE  rcvd: 107
Host info
116.125.135.81.in-addr.arpa domain name pointer host81-135-125-116.range81-135.btcentralplus.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.125.135.81.in-addr.arpa	name = host81-135-125-116.range81-135.btcentralplus.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
47.103.3.70 attack
20 attempts against mh-ssh on steel
2020-07-13 15:43:21
139.155.24.139 attack
Jul 13 07:53:28 lukav-desktop sshd\[9236\]: Invalid user password from 139.155.24.139
Jul 13 07:53:28 lukav-desktop sshd\[9236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.24.139
Jul 13 07:53:30 lukav-desktop sshd\[9236\]: Failed password for invalid user password from 139.155.24.139 port 45466 ssh2
Jul 13 07:55:07 lukav-desktop sshd\[9253\]: Invalid user fuq from 139.155.24.139
Jul 13 07:55:07 lukav-desktop sshd\[9253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.24.139
2020-07-13 15:58:12
142.44.139.12 attackbotsspam
srv02 SSH BruteForce Attacks 22 ..
2020-07-13 15:55:50
79.232.172.18 attackspam
Invalid user prometey from 79.232.172.18 port 34066
2020-07-13 15:46:59
171.255.66.95 attackspam
Email rejected due to spam filtering
2020-07-13 15:52:25
121.123.189.185 attackbots
20 attempts against mh-ssh on snow
2020-07-13 15:48:56
111.229.163.149 attack
2020-07-13T04:19:12.652911shield sshd\[5587\]: Invalid user telegraf from 111.229.163.149 port 41770
2020-07-13T04:19:12.661776shield sshd\[5587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.163.149
2020-07-13T04:19:14.736999shield sshd\[5587\]: Failed password for invalid user telegraf from 111.229.163.149 port 41770 ssh2
2020-07-13T04:23:07.802195shield sshd\[6766\]: Invalid user rtorrent from 111.229.163.149 port 56842
2020-07-13T04:23:07.810627shield sshd\[6766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.163.149
2020-07-13 15:35:48
49.233.216.158 attackspambots
Jul 13 08:42:23 mellenthin sshd[593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.216.158
Jul 13 08:42:25 mellenthin sshd[593]: Failed password for invalid user position from 49.233.216.158 port 32890 ssh2
2020-07-13 15:39:34
138.68.148.177 attackbotsspam
2020-07-13T07:00:27.814648galaxy.wi.uni-potsdam.de sshd[8200]: Invalid user cbq from 138.68.148.177 port 52796
2020-07-13T07:00:27.820333galaxy.wi.uni-potsdam.de sshd[8200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.177
2020-07-13T07:00:27.814648galaxy.wi.uni-potsdam.de sshd[8200]: Invalid user cbq from 138.68.148.177 port 52796
2020-07-13T07:00:30.005188galaxy.wi.uni-potsdam.de sshd[8200]: Failed password for invalid user cbq from 138.68.148.177 port 52796 ssh2
2020-07-13T07:03:38.574716galaxy.wi.uni-potsdam.de sshd[8561]: Invalid user alpha from 138.68.148.177 port 48096
2020-07-13T07:03:38.580080galaxy.wi.uni-potsdam.de sshd[8561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.177
2020-07-13T07:03:38.574716galaxy.wi.uni-potsdam.de sshd[8561]: Invalid user alpha from 138.68.148.177 port 48096
2020-07-13T07:03:40.985683galaxy.wi.uni-potsdam.de sshd[8561]: Failed password for i
...
2020-07-13 15:58:40
222.186.169.192 attack
Jul 13 03:09:00 NPSTNNYC01T sshd[10924]: Failed password for root from 222.186.169.192 port 41046 ssh2
Jul 13 03:09:03 NPSTNNYC01T sshd[10924]: Failed password for root from 222.186.169.192 port 41046 ssh2
Jul 13 03:09:07 NPSTNNYC01T sshd[10924]: Failed password for root from 222.186.169.192 port 41046 ssh2
Jul 13 03:09:10 NPSTNNYC01T sshd[10924]: Failed password for root from 222.186.169.192 port 41046 ssh2
...
2020-07-13 15:31:04
77.40.3.196 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 77.40.3.196 (RU/Russia/196.3.dialup.mari-el.ru): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-13 08:22:41 plain authenticator failed for (localhost) [77.40.3.196]: 535 Incorrect authentication data (set_id=payments@safanicu.com)
2020-07-13 15:24:14
52.237.198.200 attackbots
Jul 13 07:15:06 lnxded63 sshd[13754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.237.198.200
2020-07-13 15:38:16
150.109.151.136 attack
Port scan denied
2020-07-13 15:50:45
129.211.30.94 attackbots
2020-07-13T07:58:48.492621+02:00  sshd[24640]: Failed password for invalid user tux from 129.211.30.94 port 56652 ssh2
2020-07-13 15:39:15
120.71.146.45 attack
Jul 13 07:51:00 ArkNodeAT sshd\[2553\]: Invalid user ftpuser from 120.71.146.45
Jul 13 07:51:00 ArkNodeAT sshd\[2553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.146.45
Jul 13 07:51:01 ArkNodeAT sshd\[2553\]: Failed password for invalid user ftpuser from 120.71.146.45 port 54228 ssh2
2020-07-13 15:41:25

Recently Reported IPs

83.208.131.215 145.161.215.159 144.201.105.161 234.189.234.191
247.61.26.22 86.219.245.45 139.96.147.56 207.52.235.11
87.20.64.93 68.132.2.21 57.77.28.42 140.173.46.133
104.251.62.31 88.162.127.34 81.11.64.91 204.10.52.148
163.124.142.185 76.243.200.149 80.242.116.253 181.114.186.140