Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.140.57.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5175
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.140.57.137.			IN	A

;; AUTHORITY SECTION:
.			541	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 18:17:30 CST 2022
;; MSG SIZE  rcvd: 106
Host info
137.57.140.81.in-addr.arpa domain name pointer dsl-sp-81-140-57-137.in-addr.broadbandscope.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.57.140.81.in-addr.arpa	name = dsl-sp-81-140-57-137.in-addr.broadbandscope.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.91.91.195 attackbotsspam
1592798125 - 06/22/2020 05:55:25 Host: 103.91.91.195/103.91.91.195 Port: 445 TCP Blocked
2020-06-22 12:25:47
51.254.32.102 attackbotsspam
fail2ban -- 51.254.32.102
...
2020-06-22 12:18:00
115.79.139.44 attack
1592798135 - 06/22/2020 05:55:35 Host: 115.79.139.44/115.79.139.44 Port: 445 TCP Blocked
2020-06-22 12:12:37
129.144.6.146 attackbots
srv.marc-hoffrichter.de:443 129.144.6.146 - - [22/Jun/2020:05:55:36 +0200] "GET /dana-na HTTP/1.1" 403 4836 "-" "Go-http-client/1.1"
2020-06-22 12:15:37
162.243.141.37 attack
Jun 21 23:55:38 Host-KEWR-E postfix/smtps/smtpd[2301]: lost connection after CONNECT from unknown[162.243.141.37]
...
2020-06-22 12:13:57
139.59.171.46 attack
CMS (WordPress or Joomla) login attempt.
2020-06-22 12:29:54
36.112.104.194 attackspam
k+ssh-bruteforce
2020-06-22 12:02:55
95.155.238.194 attack
Unauthorized connection attempt detected from IP address 95.155.238.194 to port 443
2020-06-22 08:25:55
114.236.199.186 attackbots
Unauthorized connection attempt detected from IP address 114.236.199.186 to port 8080
2020-06-22 08:24:15
187.102.160.218 attackbots
Automatic report - Port Scan Attack
2020-06-22 08:20:49
202.154.184.148 attack
Jun 22 00:51:51 firewall sshd[3741]: Invalid user lra from 202.154.184.148
Jun 22 00:51:53 firewall sshd[3741]: Failed password for invalid user lra from 202.154.184.148 port 49898 ssh2
Jun 22 00:55:24 firewall sshd[3849]: Invalid user steve from 202.154.184.148
...
2020-06-22 12:26:55
91.227.18.122 attackspambots
Jun 21 23:49:48 lanister sshd[23943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.227.18.122
Jun 21 23:49:48 lanister sshd[23943]: Invalid user wave from 91.227.18.122
Jun 21 23:49:50 lanister sshd[23943]: Failed password for invalid user wave from 91.227.18.122 port 48204 ssh2
Jun 21 23:55:42 lanister sshd[24086]: Invalid user ftp2 from 91.227.18.122
2020-06-22 12:11:19
190.187.87.75 attackspam
5x Failed Password
2020-06-22 12:14:28
177.124.57.118 attackbotsspam
Unauthorized connection attempt detected from IP address 177.124.57.118 to port 8089
2020-06-22 08:22:25
51.178.169.200 attack
$f2bV_matches
2020-06-22 12:27:25

Recently Reported IPs

81.140.186.214 81.151.16.23 81.156.141.6 81.16.114.225
81.16.126.82 81.15.239.255 81.16.247.83 81.162.105.81
81.162.125.68 81.162.64.72 81.161.252.18 81.162.64.123
81.162.99.207 81.162.64.80 81.162.64.87 81.163.116.188
81.163.12.99 81.163.31.125 81.163.27.170 81.163.35.90