Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.204.171.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.204.171.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 21:46:11 CST 2025
;; MSG SIZE  rcvd: 105
Host info
1.171.204.81.in-addr.arpa domain name pointer 81-204-171-1.fixed.kpn.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.171.204.81.in-addr.arpa	name = 81-204-171-1.fixed.kpn.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.197.129.38 attackbotsspam
2019-10-29T18:30:26.582901abusebot.cloudsearch.cf sshd\[3785\]: Invalid user nimda321 from 138.197.129.38 port 45782
2019-10-30 02:40:33
222.186.175.150 attackspam
Oct 29 19:42:46 root sshd[21734]: Failed password for root from 222.186.175.150 port 23112 ssh2
Oct 29 19:42:53 root sshd[21734]: Failed password for root from 222.186.175.150 port 23112 ssh2
Oct 29 19:42:57 root sshd[21734]: Failed password for root from 222.186.175.150 port 23112 ssh2
Oct 29 19:43:01 root sshd[21734]: Failed password for root from 222.186.175.150 port 23112 ssh2
...
2019-10-30 02:49:49
87.120.36.238 attack
Oct 29 15:49:36 minden010 sshd[1264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.120.36.238
Oct 29 15:49:38 minden010 sshd[1264]: Failed password for invalid user qwerty from 87.120.36.238 port 40488 ssh2
Oct 29 15:55:07 minden010 sshd[5199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.120.36.238
...
2019-10-30 02:42:14
178.176.162.113 attackbots
Unauthorized connection attempt from IP address 178.176.162.113 on Port 445(SMB)
2019-10-30 02:53:08
106.13.103.1 attackspambots
Oct 29 18:58:12 SilenceServices sshd[28486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.1
Oct 29 18:58:14 SilenceServices sshd[28486]: Failed password for invalid user mx from 106.13.103.1 port 35772 ssh2
Oct 29 19:02:49 SilenceServices sshd[666]: Failed password for root from 106.13.103.1 port 45710 ssh2
2019-10-30 02:28:58
129.226.76.114 attack
2019-10-29T12:36:18.430146abusebot-3.cloudsearch.cf sshd\[28815\]: Invalid user helen from 129.226.76.114 port 35202
2019-10-30 02:44:53
218.92.0.202 attack
2019-10-29T18:28:35.825677abusebot-8.cloudsearch.cf sshd\[20185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
2019-10-30 02:35:22
51.77.140.244 attackbots
2019-10-29T16:29:30.142514  sshd[16814]: Invalid user htmladm from 51.77.140.244 port 57030
2019-10-29T16:29:30.158455  sshd[16814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.244
2019-10-29T16:29:30.142514  sshd[16814]: Invalid user htmladm from 51.77.140.244 port 57030
2019-10-29T16:29:31.944644  sshd[16814]: Failed password for invalid user htmladm from 51.77.140.244 port 57030 ssh2
2019-10-29T16:38:09.524098  sshd[16933]: Invalid user 12qw23as45zx from 51.77.140.244 port 42234
...
2019-10-30 02:31:01
189.59.36.131 attackspam
Oct 29 13:53:12 localhost sshd\[5793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.59.36.131  user=root
Oct 29 13:53:14 localhost sshd\[5793\]: Failed password for root from 189.59.36.131 port 44410 ssh2
Oct 29 13:58:17 localhost sshd\[6063\]: Invalid user contador from 189.59.36.131
Oct 29 13:58:17 localhost sshd\[6063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.59.36.131
Oct 29 13:58:19 localhost sshd\[6063\]: Failed password for invalid user contador from 189.59.36.131 port 55034 ssh2
...
2019-10-30 02:56:06
51.77.201.36 attackbotsspam
Oct 29 19:06:57 v22018076622670303 sshd\[21689\]: Invalid user csgo from 51.77.201.36 port 56020
Oct 29 19:06:57 v22018076622670303 sshd\[21689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.201.36
Oct 29 19:06:58 v22018076622670303 sshd\[21689\]: Failed password for invalid user csgo from 51.77.201.36 port 56020 ssh2
...
2019-10-30 02:18:48
148.66.132.247 attack
Bad crawling causing excessive 404 errors
2019-10-30 02:58:05
113.160.222.35 attackspam
Unauthorized connection attempt from IP address 113.160.222.35 on Port 445(SMB)
2019-10-30 02:54:15
197.47.202.141 attack
Telnet/23 MH Probe, BF, Hack -
2019-10-30 02:22:27
116.48.119.189 attackbots
" "
2019-10-30 02:43:26
14.172.218.151 attackbotsspam
Unauthorized connection attempt from IP address 14.172.218.151 on Port 445(SMB)
2019-10-30 02:46:55

Recently Reported IPs

56.97.138.186 26.81.118.105 139.170.245.250 210.7.130.69
61.107.57.152 55.178.88.243 175.43.206.8 114.116.136.157
177.142.202.110 100.200.47.197 151.118.155.186 16.135.229.70
151.171.209.102 138.247.2.246 234.60.244.155 119.252.209.159
228.248.210.219 65.45.12.254 248.248.39.203 86.10.250.102