Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Latvia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.198.137.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.198.137.204.			IN	A

;; AUTHORITY SECTION:
.			404	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 15:22:37 CST 2022
;; MSG SIZE  rcvd: 107
Host info
204.137.198.81.in-addr.arpa domain name pointer host204.apollo.lv.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
204.137.198.81.in-addr.arpa	name = host204.apollo.lv.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.191.60.199 attack
Invalid user jenkins from 94.191.60.199 port 43564
2019-07-11 21:36:47
172.247.55.139 attack
nginx-http-auth intrusion attempt
2019-07-11 22:09:10
81.12.159.146 attackbotsspam
Invalid user it from 81.12.159.146 port 34266
2019-07-11 21:58:25
107.170.237.32 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-11 21:28:57
157.55.39.151 attack
Automatic report - Web App Attack
2019-07-11 21:59:55
178.49.9.210 attackspam
Invalid user squid from 178.49.9.210 port 49902
2019-07-11 21:32:31
185.220.101.60 attackbotsspam
Jul 11 08:36:18 TORMINT sshd\[31610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.60  user=root
Jul 11 08:36:20 TORMINT sshd\[31610\]: Failed password for root from 185.220.101.60 port 46397 ssh2
Jul 11 08:36:33 TORMINT sshd\[31610\]: Failed password for root from 185.220.101.60 port 46397 ssh2
...
2019-07-11 22:06:25
123.24.1.16 attack
445/tcp
[2019-07-11]1pkt
2019-07-11 21:22:28
185.244.25.111 attack
[portscan] tcp/22 [SSH]
[portscan] tcp/23 [TELNET]
[scan/connect: 2 time(s)]
*(RWIN=65535,19765)(07111009)
2019-07-11 21:59:11
27.203.218.18 attack
23/tcp
[2019-07-11]1pkt
2019-07-11 21:31:07
45.82.153.6 attackbotsspam
Multiport scan : 11 ports scanned 4570 4571 4572 4575 4577 4578 4579 4580 4583 4584 4585
2019-07-11 21:30:50
180.253.110.218 attack
firewall-block, port(s): 23/tcp
2019-07-11 21:47:29
83.110.85.74 attack
Jul 11 05:37:54 m3061 sshd[16041]: Did not receive identification string from 83.110.85.74
Jul 11 05:39:18 m3061 sshd[16042]: Invalid user admin1 from 83.110.85.74
Jul 11 05:39:28 m3061 sshd[16042]: Failed password for invalid user admin1 from 83.110.85.74 port 58299 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=83.110.85.74
2019-07-11 21:10:43
179.108.240.220 attackbots
Jul 10 23:40:52 web1 postfix/smtpd[18046]: warning: unknown[179.108.240.220]: SASL PLAIN authentication failed: authentication failure
...
2019-07-11 21:13:09
128.199.211.118 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-11 21:32:15

Recently Reported IPs

59.127.18.188 23.228.199.37 183.88.0.236 85.209.150.140
103.25.134.148 212.119.44.156 34.141.195.136 111.8.205.222
50.197.237.246 116.68.111.115 187.8.227.238 189.89.211.150
203.218.231.14 200.35.85.158 181.113.113.78 83.254.171.202
177.249.170.184 138.118.235.201 171.8.172.166 137.184.3.152