Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.161.145.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.161.145.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 14:58:46 CST 2025
;; MSG SIZE  rcvd: 106
Host info
29.145.161.81.in-addr.arpa domain name pointer ip2.c95.amb49.cust.comxnet.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
29.145.161.81.in-addr.arpa	name = ip2.c95.amb49.cust.comxnet.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.251.141.64 attackspambots
Unauthorized connection attempt from IP address 14.251.141.64 on Port 445(SMB)
2020-04-14 19:36:00
67.205.144.244 attackbotsspam
firewall-block, port(s): 12391/tcp
2020-04-14 19:14:03
58.218.150.170 attackspambots
fail2ban
2020-04-14 19:28:28
120.31.160.67 attack
Honeypot attack, port: 445, PTR: ns1.eflydns.net.
2020-04-14 19:17:59
87.107.30.50 attackbotsspam
Unauthorized connection attempt from IP address 87.107.30.50 on Port 445(SMB)
2020-04-14 19:29:43
113.193.243.35 attackspam
2020-04-14T05:08:02.204570linuxbox-skyline sshd[113878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.243.35  user=root
2020-04-14T05:08:04.456315linuxbox-skyline sshd[113878]: Failed password for root from 113.193.243.35 port 56550 ssh2
...
2020-04-14 19:18:28
216.83.52.120 attack
Invalid user majordom from 216.83.52.120 port 13429
2020-04-14 19:27:41
93.211.217.12 attack
RDP Brute-Force (Grieskirchen RZ2)
2020-04-14 19:33:41
113.190.37.150 attackspam
Unauthorized connection attempt from IP address 113.190.37.150 on Port 445(SMB)
2020-04-14 19:18:59
202.137.142.196 attack
Apr 14 05:45:26 *host* sshd\[19131\]: Invalid user admin from 202.137.142.196 port 45782
2020-04-14 19:48:42
186.67.248.5 attackbotsspam
2020-04-14T06:10:44.109407shield sshd\[1325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.5  user=root
2020-04-14T06:10:45.846618shield sshd\[1325\]: Failed password for root from 186.67.248.5 port 35404 ssh2
2020-04-14T06:13:36.849932shield sshd\[2075\]: Invalid user peuser from 186.67.248.5 port 48911
2020-04-14T06:13:36.853542shield sshd\[2075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.5
2020-04-14T06:13:39.202964shield sshd\[2075\]: Failed password for invalid user peuser from 186.67.248.5 port 48911 ssh2
2020-04-14 19:16:24
93.74.162.49 attackspambots
SSH brutforce
2020-04-14 19:22:57
36.92.159.169 attackbots
Unauthorized connection attempt from IP address 36.92.159.169 on Port 445(SMB)
2020-04-14 19:15:33
115.78.128.79 attack
Unauthorized connection attempt from IP address 115.78.128.79 on Port 445(SMB)
2020-04-14 19:33:26
117.3.64.176 attackbots
Unauthorized connection attempt from IP address 117.3.64.176 on Port 445(SMB)
2020-04-14 19:26:52

Recently Reported IPs

28.202.167.111 124.201.184.14 104.133.69.182 43.39.226.89
165.12.186.85 36.57.226.73 174.33.235.139 213.60.244.15
221.185.53.146 16.224.38.7 237.91.174.57 31.85.80.141
220.86.54.120 186.121.131.181 106.54.49.205 125.98.82.129
2.122.101.252 227.125.217.77 60.19.209.247 201.251.133.244