Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
81.200.82.143 attackbotsspam
unauthorized connection attempt
2020-01-17 21:01:30
81.200.82.122 attackbots
[portscan] Port scan
2019-12-18 19:20:31
81.200.82.143 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/81.200.82.143/ 
 
 RU - 1H : (161)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN41109 
 
 IP : 81.200.82.143 
 
 CIDR : 81.200.80.0/20 
 
 PREFIX COUNT : 1 
 
 UNIQUE IP COUNT : 4096 
 
 
 ATTACKS DETECTED ASN41109 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-29 12:40:17 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-29 21:19:34
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.200.82.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18725
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.200.82.114.			IN	A

;; AUTHORITY SECTION:
.			344	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010800 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 08 14:46:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 114.82.200.81.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.82.200.81.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.26.136.1 attackbots
Unauthorized connection attempt detected from IP address 81.26.136.1 to port 8080
2019-12-31 21:56:10
120.7.211.192 attackspam
Dec 31 10:35:00 vmd46246 kernel: [1696289.818697] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:fb:88:28:99:3a:4d:30:af:08:00 SRC=120.7.211.192 DST=144.91.112.181 LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=58482 PROTO=TCP SPT=64330 DPT=23 WINDOW=1833 RES=0x00 SYN URGP=0 
Dec 31 10:35:01 vmd46246 kernel: [1696290.415589] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:fb:88:28:99:3a:4d:30:af:08:00 SRC=120.7.211.192 DST=144.91.112.181 LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=58482 PROTO=TCP SPT=64330 DPT=23 WINDOW=1833 RES=0x00 SYN URGP=0 
Dec 31 10:35:01 vmd46246 kernel: [1696290.462506] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:fb:88:28:99:3a:4d:30:af:08:00 SRC=120.7.211.192 DST=144.91.112.181 LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=58482 PROTO=TCP SPT=64330 DPT=23 WINDOW=1833 RES=0x00 SYN URGP=0 
...
2019-12-31 22:22:09
182.96.186.67 attackbots
Unauthorized connection attempt detected from IP address 182.96.186.67 to port 445
2019-12-31 21:42:31
175.19.204.3 attackspam
Unauthorized connection attempt detected from IP address 175.19.204.3 to port 1433
2019-12-31 21:45:19
89.248.172.90 attack
Unauthorized connection attempt detected from IP address 89.248.172.90 to port 9000
2019-12-31 21:55:35
120.244.114.75 attackbotsspam
Unauthorized connection attempt detected from IP address 120.244.114.75 to port 3389
2019-12-31 22:20:48
176.239.173.45 attackbots
Unauthorized connection attempt detected from IP address 176.239.173.45 to port 445
2019-12-31 22:11:48
223.72.80.183 attackspambots
Unauthorized connection attempt detected from IP address 223.72.80.183 to port 3389
2019-12-31 22:02:51
91.6.34.11 attackbotsspam
Lines containing failures of 91.6.34.11
Dec 31 07:16:07 mx-in-02 sshd[20848]: Invalid user pi from 91.6.34.11 port 37136
Dec 31 07:16:07 mx-in-02 sshd[20847]: Invalid user pi from 91.6.34.11 port 37130
Dec 31 07:16:07 mx-in-02 sshd[20848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.6.34.11 
Dec 31 07:16:07 mx-in-02 sshd[20847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.6.34.11 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=91.6.34.11
2019-12-31 21:55:20
120.244.115.98 attack
Unauthorized connection attempt detected from IP address 120.244.115.98 to port 3389
2019-12-31 22:19:49
182.103.12.81 attackspam
Unauthorized connection attempt detected from IP address 182.103.12.81 to port 445
2019-12-31 21:41:10
180.103.175.26 attackspam
23/tcp
[2019-12-31]1pkt
2019-12-31 21:44:01
182.96.29.21 attackbotsspam
Unauthorized connection attempt detected from IP address 182.96.29.21 to port 445
2019-12-31 21:43:24
121.28.199.78 attackspam
Unauthorized connection attempt detected from IP address 121.28.199.78 to port 1433
2019-12-31 21:47:19
112.101.74.223 attack
Unauthorized connection attempt detected from IP address 112.101.74.223 to port 1433
2019-12-31 21:52:19

Recently Reported IPs

250.41.92.208 197.110.216.205 21.42.46.178 124.163.44.92
76.73.168.216 115.4.196.158 253.236.77.169 110.201.240.29
157.208.36.168 0.34.71.121 86.86.170.183 173.135.12.41
208.163.167.52 180.245.206.62 12.164.31.32 23.186.159.107
19.227.214.184 172.255.127.91 185.80.134.70 102.240.77.225