Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.197.214.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.197.214.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 16:17:26 CST 2025
;; MSG SIZE  rcvd: 106
Host info
54.214.197.81.in-addr.arpa domain name pointer 81-197-214-54.elisa-laajakaista.fi.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.214.197.81.in-addr.arpa	name = 81-197-214-54.elisa-laajakaista.fi.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.211.141.217 attack
Jul 28 13:56:17 mail sshd\[1040\]: Invalid user rola from 190.211.141.217 port 15656
Jul 28 13:56:17 mail sshd\[1040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.141.217
Jul 28 13:56:19 mail sshd\[1040\]: Failed password for invalid user rola from 190.211.141.217 port 15656 ssh2
Jul 28 14:01:47 mail sshd\[2343\]: Invalid user XiaoWang from 190.211.141.217 port 39713
Jul 28 14:01:47 mail sshd\[2343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.141.217
2019-07-28 20:19:43
213.32.39.236 attack
Jul 28 13:19:59 debian sshd\[23641\]: Invalid user P@ssword01 from 213.32.39.236 port 54748
Jul 28 13:19:59 debian sshd\[23641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.39.236
...
2019-07-28 20:58:46
176.108.100.165 attack
Jul 28 11:30:26 localhost sshd\[27678\]: Invalid user user1 from 176.108.100.165 port 52972
Jul 28 11:30:30 localhost sshd\[27678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.108.100.165
Jul 28 11:30:33 localhost sshd\[27678\]: Failed password for invalid user user1 from 176.108.100.165 port 52972 ssh2
...
2019-07-28 20:21:42
156.194.127.42 attackspambots
Jul 28 14:30:31 srv-4 sshd\[1159\]: Invalid user admin from 156.194.127.42
Jul 28 14:30:31 srv-4 sshd\[1159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.194.127.42
Jul 28 14:30:33 srv-4 sshd\[1159\]: Failed password for invalid user admin from 156.194.127.42 port 33443 ssh2
...
2019-07-28 20:17:26
185.143.221.58 attack
Jul 28 14:32:00 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.221.58 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=27480 PROTO=TCP SPT=54017 DPT=11223 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-28 21:08:09
180.241.35.70 attackbots
Jul 28 13:29:46 amit sshd\[12086\]: Invalid user user1 from 180.241.35.70
Jul 28 13:29:47 amit sshd\[12086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.241.35.70
Jul 28 13:29:49 amit sshd\[12086\]: Failed password for invalid user user1 from 180.241.35.70 port 61923 ssh2
...
2019-07-28 20:55:41
174.138.56.93 attackbots
Triggered by Fail2Ban at Vostok web server
2019-07-28 20:09:51
206.81.24.64 attackspam
Jul 28 13:26:13 vps647732 sshd[18699]: Failed password for root from 206.81.24.64 port 50292 ssh2
...
2019-07-28 20:15:54
191.184.203.71 attackbotsspam
Jul 28 14:44:31 yabzik sshd[707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.184.203.71
Jul 28 14:44:33 yabzik sshd[707]: Failed password for invalid user student from 191.184.203.71 port 59739 ssh2
Jul 28 14:51:55 yabzik sshd[3601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.184.203.71
2019-07-28 20:57:39
192.36.164.94 attack
2019-07-28T13:30:13.374366vfs-server-01 sshd\[24049\]: Invalid user ubnt from 192.36.164.94 port 43822
2019-07-28T13:30:13.582858vfs-server-01 sshd\[24051\]: Invalid user osboxes from 192.36.164.94 port 44164
2019-07-28T13:30:13.825270vfs-server-01 sshd\[24053\]: Invalid user openhabian from 192.36.164.94 port 44504
2019-07-28 20:44:37
85.31.210.71 attackspam
Unauthorised access (Jul 28) SRC=85.31.210.71 LEN=52 TTL=120 ID=32502 DF TCP DPT=21 WINDOW=8192 SYN
2019-07-28 21:03:38
36.67.99.203 attack
Unauthorized connection attempt from IP address 36.67.99.203 on Port 445(SMB)
2019-07-28 20:10:55
185.53.88.40 attackbotsspam
Jul 28 11:56:56   DDOS Attack: SRC=185.53.88.40 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=243  PROTO=TCP SPT=51882 DPT=80 WINDOW=1200 RES=0x00 RST URGP=0
2019-07-28 20:46:28
106.13.60.187 attackspambots
Jul 28 14:27:40 dedicated sshd[31195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.60.187  user=root
Jul 28 14:27:42 dedicated sshd[31195]: Failed password for root from 106.13.60.187 port 60898 ssh2
2019-07-28 20:56:36
107.148.101.187 attackbots
Unauthorized connection attempt from IP address 107.148.101.187 on Port 445(SMB)
2019-07-28 20:29:39

Recently Reported IPs

97.104.215.65 7.127.236.146 73.202.36.147 107.132.71.242
222.192.70.95 143.122.137.62 41.90.19.165 17.179.187.2
16.190.47.192 135.188.250.79 164.125.89.55 43.96.179.102
172.154.237.47 246.226.11.82 5.65.211.189 135.158.185.188
213.153.172.231 63.240.154.84 6.117.211.138 54.38.173.121