Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vlissingen

Region: Zeeland

Country: Netherlands

Internet Service Provider: KPN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.204.85.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40586
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.204.85.212.			IN	A

;; AUTHORITY SECTION:
.			518	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 07:33:26 CST 2023
;; MSG SIZE  rcvd: 106
Host info
212.85.204.81.in-addr.arpa domain name pointer 81-204-85-212.fixed.kpn.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.85.204.81.in-addr.arpa	name = 81-204-85-212.fixed.kpn.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.214.186.186 attackspambots
SSHD brute force attack detected by fail2ban
2019-08-23 23:59:04
121.142.111.242 attackbots
Aug 23 17:03:27 jane sshd\[8927\]: Invalid user caleb from 121.142.111.242 port 52722
Aug 23 17:03:27 jane sshd\[8927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.111.242
Aug 23 17:03:30 jane sshd\[8927\]: Failed password for invalid user caleb from 121.142.111.242 port 52722 ssh2
...
2019-08-24 00:01:26
159.65.255.153 attackspambots
Aug 23 18:19:24 localhost sshd\[13703\]: Invalid user hw from 159.65.255.153
Aug 23 18:19:24 localhost sshd\[13703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.255.153
Aug 23 18:19:27 localhost sshd\[13703\]: Failed password for invalid user hw from 159.65.255.153 port 44482 ssh2
Aug 23 18:23:21 localhost sshd\[13916\]: Invalid user group1 from 159.65.255.153
Aug 23 18:23:21 localhost sshd\[13916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.255.153
...
2019-08-24 00:27:19
103.3.226.166 attackspam
Invalid user nam from 103.3.226.166 port 52118
2019-08-24 00:14:51
85.235.65.225 attack
Invalid user admin from 85.235.65.225 port 48404
2019-08-24 00:21:38
117.1.194.163 attackspam
Invalid user admin from 117.1.194.163 port 55244
2019-08-24 00:05:20
120.220.15.5 attackspam
Invalid user test from 120.220.15.5 port 2134
2019-08-24 00:02:22
92.242.126.154 attackbots
proto=tcp  .  spt=34904  .  dpt=25  .     (listed on Dark List de Aug 23)     (989)
2019-08-24 00:36:49
124.107.246.250 attackspam
Invalid user ftptest from 124.107.246.250 port 9910
2019-08-23 23:58:23
111.93.246.170 attackspambots
Aug 23 06:18:11 friendsofhawaii sshd\[27005\]: Invalid user superstar from 111.93.246.170
Aug 23 06:18:11 friendsofhawaii sshd\[27005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.246.170
Aug 23 06:18:13 friendsofhawaii sshd\[27005\]: Failed password for invalid user superstar from 111.93.246.170 port 40492 ssh2
Aug 23 06:23:22 friendsofhawaii sshd\[27422\]: Invalid user cgi from 111.93.246.170
Aug 23 06:23:22 friendsofhawaii sshd\[27422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.246.170
2019-08-24 00:26:01
94.23.62.187 attackspambots
Invalid user tisha from 94.23.62.187 port 36172
2019-08-24 00:18:27
95.58.194.141 attackspambots
Aug 23 17:40:50 XXX sshd[29165]: Invalid user ofsaa from 95.58.194.141 port 53864
2019-08-24 00:17:30
150.223.21.177 attackspam
Automated report - ssh fail2ban:
Aug 23 16:34:55 authentication failure 
Aug 23 16:34:57 wrong password, user=shashi, port=40003, ssh2
Aug 23 16:41:07 authentication failure
2019-08-23 23:50:13
107.170.198.115 attackspam
8888/tcp 7000/tcp 2086/tcp...
[2019-06-25/08-21]72pkt,55pt.(tcp),4pt.(udp)
2019-08-24 00:42:42
87.120.36.157 attackbots
Invalid user james from 87.120.36.157 port 48967
2019-08-24 00:21:07

Recently Reported IPs

18.7.244.136 208.118.245.137 121.164.94.132 188.164.33.134
189.123.68.87 135.20.25.171 198.68.29.22 124.29.253.115
62.63.88.14 149.99.84.108 22.37.118.5 90.9.10.36
181.22.107.25 82.71.94.221 231.37.195.66 153.58.32.200
182.6.4.155 211.245.19.170 9.66.67.109 46.91.6.209