Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Warsaw

Region: Mazowieckie

Country: Poland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.18.214.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47511
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.18.214.199.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031601 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 17 08:55:40 CST 2025
;; MSG SIZE  rcvd: 106
Host info
199.214.18.81.in-addr.arpa domain name pointer 81-18-214-199.static.chello.pl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.214.18.81.in-addr.arpa	name = 81-18-214-199.static.chello.pl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
66.134.104.162 attack
Unauthorized connection attempt detected from IP address 66.134.104.162 to port 445
2020-01-16 04:22:36
125.27.113.136 attack
Jan 15 20:55:07 dcd-gentoo sshd[9620]: Invalid user support from 125.27.113.136 port 55904
Jan 15 20:55:08 dcd-gentoo sshd[9624]: Invalid user support from 125.27.113.136 port 57097
Jan 15 20:55:09 dcd-gentoo sshd[9627]: Invalid user support from 125.27.113.136 port 58168
...
2020-01-16 04:00:30
212.64.218.36 attack
Unauthorized connection attempt detected from IP address 212.64.218.36 to port 1433 [J]
2020-01-16 04:26:28
85.96.189.43 attack
Unauthorized connection attempt detected from IP address 85.96.189.43 to port 23
2020-01-16 04:18:16
196.52.43.113 attackbotsspam
Unauthorized connection attempt detected from IP address 196.52.43.113 to port 554 [J]
2020-01-16 04:07:51
5.202.37.101 attackbotsspam
Unauthorized connection attempt detected from IP address 5.202.37.101 to port 80
2020-01-16 04:25:17
217.17.234.79 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-01-16 04:06:21
177.37.199.46 attackspam
Unauthorized connection attempt detected from IP address 177.37.199.46 to port 23 [J]
2020-01-16 04:11:23
189.142.76.101 attackbotsspam
Unauthorized connection attempt detected from IP address 189.142.76.101 to port 8000 [J]
2020-01-16 04:29:05
167.71.72.70 attackbots
$f2bV_matches
2020-01-16 04:02:56
49.88.112.77 attackbotsspam
Jan 15 16:34:40 firewall sshd[5909]: Failed password for root from 49.88.112.77 port 51944 ssh2
Jan 15 16:34:43 firewall sshd[5909]: Failed password for root from 49.88.112.77 port 51944 ssh2
Jan 15 16:34:45 firewall sshd[5909]: Failed password for root from 49.88.112.77 port 51944 ssh2
...
2020-01-16 03:50:13
186.47.77.214 attack
Unauthorized connection attempt detected from IP address 186.47.77.214 to port 23
2020-01-16 04:29:28
186.46.57.230 attack
Unauthorized connection attempt detected from IP address 186.46.57.230 to port 445
2020-01-16 04:10:24
189.115.20.94 attackbotsspam
Unauthorized connection attempt detected from IP address 189.115.20.94 to port 23
2020-01-16 04:08:55
173.76.219.13 attackspambots
Unauthorized connection attempt detected from IP address 173.76.219.13 to port 23
2020-01-16 04:11:47

Recently Reported IPs

148.126.141.130 161.27.165.166 242.239.89.252 125.129.71.249
91.243.185.170 9.55.84.85 98.13.16.210 142.239.197.162
236.235.47.94 201.113.195.124 25.43.221.199 229.207.52.154
13.100.50.143 181.32.144.212 47.107.106.238 191.62.240.69
73.58.114.173 198.25.202.109 118.169.54.235 119.179.224.67