Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.138.199.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63463
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.138.199.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 02:51:31 CST 2025
;; MSG SIZE  rcvd: 107
Host info
114.199.138.81.in-addr.arpa domain name pointer host81-138-199-114.in-addr.btopenworld.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.199.138.81.in-addr.arpa	name = host81-138-199-114.in-addr.btopenworld.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
66.94.126.62 attackbots
$f2bV_matches
2019-11-21 16:11:37
94.23.208.211 attackbots
Nov 21 09:37:50 server sshd\[24460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns303460.ip-94-23-208.eu  user=apache
Nov 21 09:37:52 server sshd\[24460\]: Failed password for apache from 94.23.208.211 port 60140 ssh2
Nov 21 09:52:39 server sshd\[28039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns303460.ip-94-23-208.eu  user=root
Nov 21 09:52:40 server sshd\[28039\]: Failed password for root from 94.23.208.211 port 42914 ssh2
Nov 21 09:55:54 server sshd\[28992\]: Invalid user ching from 94.23.208.211
Nov 21 09:55:54 server sshd\[28992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns303460.ip-94-23-208.eu 
...
2019-11-21 16:20:12
114.79.160.36 attack
" "
2019-11-21 16:34:03
181.198.35.108 attackbotsspam
Nov 21 09:35:43 nextcloud sshd\[26652\]: Invalid user keilman from 181.198.35.108
Nov 21 09:35:43 nextcloud sshd\[26652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.198.35.108
Nov 21 09:35:45 nextcloud sshd\[26652\]: Failed password for invalid user keilman from 181.198.35.108 port 47198 ssh2
...
2019-11-21 16:39:42
69.21.156.29 attack
TCP Port Scanning
2019-11-21 16:04:37
196.13.207.52 attackbots
Nov 21 08:23:02 SilenceServices sshd[22486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.13.207.52
Nov 21 08:23:04 SilenceServices sshd[22486]: Failed password for invalid user xxxxxxxxxx from 196.13.207.52 port 36014 ssh2
Nov 21 08:26:56 SilenceServices sshd[23554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.13.207.52
2019-11-21 16:14:59
77.226.70.99 attackspam
Honeypot attack, port: 23, PTR: static-99-70-226-77.ipcom.comunitel.net.
2019-11-21 16:34:38
129.145.0.68 attackspambots
Nov 21 08:54:52 tuxlinux sshd[5437]: Invalid user mutendebvureg from 129.145.0.68 port 25608
Nov 21 08:54:52 tuxlinux sshd[5437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.145.0.68 
Nov 21 08:54:52 tuxlinux sshd[5437]: Invalid user mutendebvureg from 129.145.0.68 port 25608
Nov 21 08:54:52 tuxlinux sshd[5437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.145.0.68 
Nov 21 08:54:52 tuxlinux sshd[5437]: Invalid user mutendebvureg from 129.145.0.68 port 25608
Nov 21 08:54:52 tuxlinux sshd[5437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.145.0.68 
Nov 21 08:54:54 tuxlinux sshd[5437]: Failed password for invalid user mutendebvureg from 129.145.0.68 port 25608 ssh2
...
2019-11-21 16:42:52
167.114.145.139 attack
IP blocked
2019-11-21 16:03:19
37.187.17.45 attackbotsspam
Lines containing failures of 37.187.17.45
Nov 19 10:41:09 shared04 sshd[31416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.17.45  user=r.r
Nov 19 10:41:11 shared04 sshd[31416]: Failed password for r.r from 37.187.17.45 port 34500 ssh2
Nov 19 10:41:11 shared04 sshd[31416]: Received disconnect from 37.187.17.45 port 34500:11: Bye Bye [preauth]
Nov 19 10:41:11 shared04 sshd[31416]: Disconnected from authenticating user r.r 37.187.17.45 port 34500 [preauth]
Nov 19 10:59:08 shared04 sshd[2658]: Invalid user admin from 37.187.17.45 port 57498
Nov 19 10:59:08 shared04 sshd[2658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.17.45
Nov 19 10:59:10 shared04 sshd[2658]: Failed password for invalid user admin from 37.187.17.45 port 57498 ssh2
Nov 19 10:59:10 shared04 sshd[2658]: Received disconnect from 37.187.17.45 port 57498:11: Bye Bye [preauth]
Nov 19 10:59:10 shared04 sshd[2658........
------------------------------
2019-11-21 16:08:53
62.76.92.22 attack
[portscan] Port scan
2019-11-21 16:20:32
150.107.210.195 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-21 16:42:30
41.215.123.158 attackbotsspam
Nov 19 11:47:21 mxgate1 postfix/postscreen[659]: CONNECT from [41.215.123.158]:10194 to [176.31.12.44]:25
Nov 19 11:47:21 mxgate1 postfix/dnsblog[668]: addr 41.215.123.158 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 11:47:21 mxgate1 postfix/dnsblog[666]: addr 41.215.123.158 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 11:47:21 mxgate1 postfix/dnsblog[667]: addr 41.215.123.158 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 19 11:47:27 mxgate1 postfix/postscreen[659]: DNSBL rank 4 for [41.215.123.158]:10194
Nov x@x
Nov 19 11:47:28 mxgate1 postfix/postscreen[659]: HANGUP after 1.2 from [41.215.123.158]:10194 in tests after SMTP handshake
Nov 19 11:47:28 mxgate1 postfix/postscreen[659]: DISCONNECT [41.215.123.158]:10194


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.215.123.158
2019-11-21 16:16:34
180.232.67.186 attackspambots
TCP Port Scanning
2019-11-21 16:37:35
118.24.28.39 attackspam
Nov 21 08:24:59 MK-Soft-Root2 sshd[21258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.28.39 
Nov 21 08:25:02 MK-Soft-Root2 sshd[21258]: Failed password for invalid user garald from 118.24.28.39 port 53618 ssh2
...
2019-11-21 16:08:20

Recently Reported IPs

44.111.56.107 194.203.161.237 168.130.0.202 57.76.7.134
155.80.103.130 145.42.34.240 205.66.46.248 189.67.167.15
37.230.167.173 225.124.194.203 42.173.218.67 36.209.212.203
186.6.172.229 223.64.162.127 37.218.71.197 76.60.87.246
28.24.136.186 30.10.160.58 68.14.61.23 206.131.128.243