Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Islington

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.141.139.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58531
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.141.139.109.			IN	A

;; AUTHORITY SECTION:
.			341	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020300 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 17:09:16 CST 2020
;; MSG SIZE  rcvd: 118
Host info
109.139.141.81.in-addr.arpa domain name pointer host81-141-139-109.in-addr.btcentralplus.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 109.139.141.81.in-addr.arpa.: No answer

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
167.172.155.50 attackspam
Apr 25 16:29:43 Ubuntu-1404-trusty-64-minimal sshd\[603\]: Invalid user bsd from 167.172.155.50
Apr 25 16:29:43 Ubuntu-1404-trusty-64-minimal sshd\[603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.155.50
Apr 25 16:29:45 Ubuntu-1404-trusty-64-minimal sshd\[603\]: Failed password for invalid user bsd from 167.172.155.50 port 33268 ssh2
Apr 25 16:42:26 Ubuntu-1404-trusty-64-minimal sshd\[11363\]: Invalid user adi from 167.172.155.50
Apr 25 16:42:26 Ubuntu-1404-trusty-64-minimal sshd\[11363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.155.50
2020-04-26 03:58:04
177.12.48.13 attackspambots
firewall-block, port(s): 23/tcp
2020-04-26 04:07:43
122.176.52.13 attack
Apr 25 22:04:57 v22018086721571380 sshd[32086]: Failed password for invalid user ep from 122.176.52.13 port 20610 ssh2
2020-04-26 04:07:12
218.92.0.192 attack
Apr 25 21:17:09 legacy sshd[27799]: Failed password for root from 218.92.0.192 port 11712 ssh2
Apr 25 21:18:10 legacy sshd[27860]: Failed password for root from 218.92.0.192 port 63588 ssh2
...
2020-04-26 03:35:42
182.61.1.203 attack
Invalid user teste from 182.61.1.203 port 56408
2020-04-26 03:49:40
212.83.58.35 attackbots
2020-04-25 21:05:08,778 fail2ban.actions: WARNING [ssh] Ban 212.83.58.35
2020-04-26 03:42:17
83.30.65.134 attack
Apr 25 14:12:26 nxxxxxxx sshd[5549]: Invalid user sylwester from 83.30.65.134
Apr 25 14:12:28 nxxxxxxx sshd[5549]: Failed password for invalid user sylwester from 83.30.65.134 port 39810 ssh2
Apr 25 14:17:13 nxxxxxxx sshd[6072]: Invalid user spotlight from 83.30.65.134


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=83.30.65.134
2020-04-26 04:03:39
209.17.97.2 attackspambots
port scan and connect, tcp 27017 (mongodb)
2020-04-26 03:50:52
115.112.62.88 attackspambots
Apr 25 17:50:19 xeon sshd[55689]: Failed password for invalid user user from 115.112.62.88 port 39774 ssh2
2020-04-26 03:40:25
185.211.247.67 attack
bruteforce detected
2020-04-26 03:34:54
218.92.0.184 attackspambots
Apr 25 21:50:33 melroy-server sshd[29924]: Failed password for root from 218.92.0.184 port 35050 ssh2
Apr 25 21:50:37 melroy-server sshd[29924]: Failed password for root from 218.92.0.184 port 35050 ssh2
...
2020-04-26 03:55:05
198.108.66.90 attackbotsspam
firewall-block, port(s): 8090/tcp
2020-04-26 04:02:49
162.243.130.8 attackspam
firewall-block, port(s): 5672/tcp
2020-04-26 04:13:37
212.64.71.132 attackbots
trying to access non-authorized port
2020-04-26 04:04:39
165.227.15.44 attackspam
" "
2020-04-26 04:10:04

Recently Reported IPs

220.101.132.230 116.40.246.140 153.192.112.219 132.65.157.219
175.178.9.24 120.230.23.153 204.227.242.85 49.162.115.42
99.89.206.57 160.13.38.131 27.202.228.162 133.170.106.74
94.139.241.128 118.45.251.174 193.112.107.200 79.43.57.22
221.194.44.153 117.48.203.169 213.160.72.208 192.169.243.42