Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '81.181.166.0 - 81.181.166.255'

% Abuse contact for '81.181.166.0 - 81.181.166.255' is 'abuse-acvile@rnc.ro'

inetnum:        81.181.166.0 - 81.181.166.255
netname:        ACVILE-TECH
descr:          Acvile Tech SRL
descr:          Str. Augustin Coman, Nr. 8-10, Timisoara
country:        RO
admin-c:        ML24764-RIPE
tech-c:         ML24764-RIPE
abuse-c:        ACRO61208-RIPE
status:         ASSIGNED PA
mnt-by:         AS3233-MNT
created:        2024-06-20T14:12:14Z
last-modified:  2025-07-29T11:36:05Z
source:         RIPE # Filtered

person:         Marius Leustean
address:        Acvile Tech SRL
address:        Str. Augustin Coman, Nr. 8-10
address:        300647, Timisoara, Romania
phone:          +40 725 388 347
nic-hdl:        ML24764-RIPE
mnt-by:         AS3233-MNT
created:        2024-06-20T14:10:44Z
last-modified:  2024-06-20T14:10:44Z
source:         RIPE # Filtered

% Information related to '81.181.166.0/24AS48881'

route:          81.181.166.0/24
descr:          Acvile Tech SRL
origin:         AS48881
mnt-by:         AS3233-MNT
created:        2024-06-20T14:53:44Z
last-modified:  2024-06-20T14:53:44Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.181.166.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53119
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.181.166.215.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 17:00:50 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 215.166.181.81.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 81.181.166.215.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
76.190.8.85 attack
Aug  7 22:01:50 localhost sshd[3981877]: Connection closed by 76.190.8.85 port 49995 [preauth]
...
2020-08-08 02:35:54
51.38.188.63 attackspam
SSH invalid-user multiple login try
2020-08-08 03:02:09
139.59.61.103 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-08-08 02:51:11
168.61.72.51 attackspam
Aug  7 15:45:15 ns382633 sshd\[8126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.72.51  user=root
Aug  7 15:45:17 ns382633 sshd\[8126\]: Failed password for root from 168.61.72.51 port 45650 ssh2
Aug  7 16:11:12 ns382633 sshd\[13364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.72.51  user=root
Aug  7 16:11:14 ns382633 sshd\[13364\]: Failed password for root from 168.61.72.51 port 53620 ssh2
Aug  7 16:38:05 ns382633 sshd\[17955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.72.51  user=root
2020-08-08 02:48:28
184.154.189.91 attack
trying to access non-authorized port
2020-08-08 03:11:39
198.27.80.123 attackspambots
198.27.80.123 - - [07/Aug/2020:19:39:43 +0100] "POST /wp-login.php HTTP/1.1" 200 4954 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [07/Aug/2020:19:39:47 +0100] "POST /wp-login.php HTTP/1.1" 200 4954 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [07/Aug/2020:19:39:54 +0100] "POST /wp-login.php HTTP/1.1" 200 4954 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-08 02:54:39
35.200.203.6 attack
(sshd) Failed SSH login from 35.200.203.6 (IN/India/6.203.200.35.bc.googleusercontent.com): 5 in the last 3600 secs
2020-08-08 02:42:14
41.69.229.141 attackspambots
(sshd) Failed SSH login from 41.69.229.141 (EG/Egypt/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD
2020-08-08 02:51:55
119.129.99.164 attackbots
port 23
2020-08-08 03:01:18
125.209.67.163 attackbotsspam
Unauthorized connection attempt from IP address 125.209.67.163 on Port 445(SMB)
2020-08-08 02:57:24
78.142.29.199 attackspam
Email login attempts - missing mail login name (IMAP)
2020-08-08 02:33:21
164.90.150.157 attack
Port Scan detected!
...
2020-08-08 02:45:37
167.99.8.129 attackspam
Unauthorized connection attempt detected from IP address 167.99.8.129 to port 7034
2020-08-08 03:11:58
79.216.184.153 attackbots
Automatic report - Port Scan Attack
2020-08-08 02:59:53
159.89.38.228 attackspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-07T16:54:35Z and 2020-08-07T17:03:06Z
2020-08-08 02:42:48

Recently Reported IPs

114.25.97.133 2606:4700:10::6814:7095 2606:4700:10::ac43:2265 2606:4700:10::6814:5200
2606:4700:10::6814:6806 2606:4700:10::ac43:1669 14.207.194.67 88.101.166.185
103.121.95.193 125.78.75.248 35.209.185.59 162.216.150.206
191.79.218.214 2606:4700:10::ac43:1445 2606:4700:10::6816:4031 2606:4700:10::ac43:1249
2606:4700:10::6814:5276 2606:4700:10::ac43:856 2606:4700:10::6814:8088 164.155.74.84