Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kilmarnock

Region: Scotland

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.141.138.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.141.138.126.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060300 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 03 16:05:46 CST 2024
;; MSG SIZE  rcvd: 107
Host info
126.138.141.81.in-addr.arpa domain name pointer host81-141-138-126.range81-141.btcentralplus.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
126.138.141.81.in-addr.arpa	name = host81-141-138-126.range81-141.btcentralplus.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.226.235.63 attack
SSH login attempts.
2020-10-11 23:58:22
106.12.37.20 attackspambots
TCP ports : 2906 / 27832
2020-10-11 23:33:02
122.52.112.252 attack
Port Scan detected!
...
2020-10-12 00:02:28
81.68.239.140 attackspambots
SSH login attempts.
2020-10-12 00:12:02
175.201.126.48 attackspambots
 UDP 175.201.126.48:5060 -> port 30301, len 75
2020-10-11 23:45:23
66.57.151.234 attackbotsspam
Icarus honeypot on github
2020-10-12 00:13:28
173.15.85.9 attackbotsspam
Oct 11 11:09:08 mail sshd[6036]: Failed password for root from 173.15.85.9 port 10977 ssh2
2020-10-11 23:34:29
87.188.112.15 attack
Brute-force attempt banned
2020-10-12 00:08:33
153.101.167.242 attack
Invalid user marketing1 from 153.101.167.242 port 56798
2020-10-11 23:43:44
218.241.134.34 attack
SSH login attempts.
2020-10-11 23:46:12
114.67.169.63 attackspam
sshd jail - ssh hack attempt
2020-10-11 23:48:38
103.88.247.212 attack
Oct 11 14:12:57 jumpserver sshd[60293]: Invalid user alfredo from 103.88.247.212 port 39354
Oct 11 14:12:59 jumpserver sshd[60293]: Failed password for invalid user alfredo from 103.88.247.212 port 39354 ssh2
Oct 11 14:14:39 jumpserver sshd[60300]: Invalid user cristina from 103.88.247.212 port 60604
...
2020-10-11 23:49:16
88.157.239.6 attackbots
Automatically reported by fail2ban report script (mx1)
2020-10-12 00:10:47
103.207.36.44 attackbots
[HOST2] Port Scan detected
2020-10-12 00:03:17
142.93.193.63 attackspambots
142.93.193.63 - - [10/Oct/2020:23:36:39 +0100] "POST /wp-login.php HTTP/1.1" 200 2302 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.193.63 - - [10/Oct/2020:23:36:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.193.63 - - [10/Oct/2020:23:36:43 +0100] "POST /wp-login.php HTTP/1.1" 200 2282 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-12 00:13:01

Recently Reported IPs

193.59.51.110 92.176.255.147 225.111.148.93 178.15.207.88
171.102.43.219 91.12.166.91 225.35.230.93 76.195.112.80
211.243.151.153 162.137.4.138 167.252.150.74 211.127.172.234
36.99.89.149 63.188.182.228 112.45.189.180 22.247.66.241
174.190.208.50 147.206.241.173 232.67.197.193 123.178.241.0