Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hannover

Region: Niedersachsen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.14.229.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.14.229.120.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 13:12:02 CST 2025
;; MSG SIZE  rcvd: 106
Host info
120.229.14.81.in-addr.arpa domain name pointer a81-14-229-120.net-htp.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
120.229.14.81.in-addr.arpa	name = a81-14-229-120.net-htp.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.197.202.164 attackbotsspam
Apr 22 18:46:24 [host] sshd[28663]: Invalid user c
Apr 22 18:46:24 [host] sshd[28663]: pam_unix(sshd:
Apr 22 18:46:25 [host] sshd[28663]: Failed passwor
2020-04-23 01:07:12
118.71.116.41 attack
Email rejected due to spam filtering
2020-04-23 00:55:55
171.226.66.239 attackbots
Honeypot attack, port: 4567, PTR: dynamic-ip-adsl.viettel.vn.
2020-04-23 01:38:54
106.12.52.98 attackspam
Apr 22 15:51:05 ws26vmsma01 sshd[237163]: Failed password for root from 106.12.52.98 port 41140 ssh2
Apr 22 16:10:09 ws26vmsma01 sshd[6709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.52.98
...
2020-04-23 01:12:42
108.90.153.106 attackbotsspam
Honeypot attack, port: 5555, PTR: 108-90-153-106.lightspeed.frokca.sbcglobal.net.
2020-04-23 01:09:42
3.21.163.59 attackbots
Scanning for exploits - /.env
2020-04-23 01:11:17
27.50.63.6 attackspam
SSH Brute-Force Attack
2020-04-23 01:12:59
188.170.53.74 attackbots
Unauthorized connection attempt from IP address 188.170.53.74 on Port 445(SMB)
2020-04-23 01:33:06
223.230.85.19 attackbots
Email rejected due to spam filtering
2020-04-23 01:16:22
140.143.140.242 attackbotsspam
Tried sshing with brute force.
2020-04-23 00:57:34
125.163.117.116 attackbotsspam
Unauthorized connection attempt from IP address 125.163.117.116 on Port 445(SMB)
2020-04-23 01:23:25
124.239.218.188 attack
20 attempts against mh-ssh on echoip
2020-04-23 01:37:52
41.230.82.220 attack
Unauthorized connection attempt from IP address 41.230.82.220 on Port 445(SMB)
2020-04-23 01:10:45
112.204.237.133 spambotsattackproxynormal
Please help me about this
2020-04-23 01:31:26
58.210.96.156 attackbotsspam
2020-04-22T16:24:19.390117shield sshd\[30988\]: Invalid user admin from 58.210.96.156 port 59497
2020-04-22T16:24:19.393684shield sshd\[30988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.96.156
2020-04-22T16:24:20.575223shield sshd\[30988\]: Failed password for invalid user admin from 58.210.96.156 port 59497 ssh2
2020-04-22T16:28:35.680262shield sshd\[31671\]: Invalid user s from 58.210.96.156 port 54920
2020-04-22T16:28:35.683839shield sshd\[31671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.96.156
2020-04-23 01:08:18

Recently Reported IPs

206.71.217.138 103.227.126.57 217.142.185.43 134.164.124.179
179.245.49.143 70.83.60.106 213.4.223.195 209.207.126.18
6.113.191.70 130.162.250.215 127.104.194.112 24.167.25.38
120.6.85.14 118.129.14.162 254.226.113.128 170.45.172.192
164.20.137.150 75.13.145.120 47.69.57.12 241.185.50.209