Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.205.104.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.205.104.211.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:59:29 CST 2025
;; MSG SIZE  rcvd: 107
Host info
211.104.205.81.in-addr.arpa domain name pointer 81-205-104-211.fixed.kpn.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
211.104.205.81.in-addr.arpa	name = 81-205-104-211.fixed.kpn.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.217.41.235 attackbots
2019-10-21 x@x
2019-10-21 10:22:59 unexpected disconnection while reading SMTP command from ([46.217.41.235]) [46.217.41.235]:25588 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.217.41.235
2019-10-23 01:26:53
128.134.217.17 attackspam
Brute force attempt
2019-10-23 01:54:26
177.139.153.186 attack
Oct 22 05:26:29 php1 sshd\[21628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.153.186  user=root
Oct 22 05:26:31 php1 sshd\[21628\]: Failed password for root from 177.139.153.186 port 52810 ssh2
Oct 22 05:31:50 php1 sshd\[22041\]: Invalid user raimundo from 177.139.153.186
Oct 22 05:31:50 php1 sshd\[22041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.153.186
Oct 22 05:31:52 php1 sshd\[22041\]: Failed password for invalid user raimundo from 177.139.153.186 port 44170 ssh2
2019-10-23 02:03:34
111.198.54.177 attack
Oct 22 19:16:56 SilenceServices sshd[32081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.177
Oct 22 19:16:59 SilenceServices sshd[32081]: Failed password for invalid user leyla from 111.198.54.177 port 44366 ssh2
Oct 22 19:21:05 SilenceServices sshd[727]: Failed password for root from 111.198.54.177 port 50872 ssh2
2019-10-23 01:27:44
206.189.30.73 attackbotsspam
Oct 22 15:03:54 pkdns2 sshd\[17387\]: Invalid user mara from 206.189.30.73Oct 22 15:03:56 pkdns2 sshd\[17387\]: Failed password for invalid user mara from 206.189.30.73 port 53554 ssh2Oct 22 15:07:35 pkdns2 sshd\[17570\]: Invalid user 1z2x3 from 206.189.30.73Oct 22 15:07:37 pkdns2 sshd\[17570\]: Failed password for invalid user 1z2x3 from 206.189.30.73 port 35812 ssh2Oct 22 15:11:13 pkdns2 sshd\[17774\]: Invalid user security from 206.189.30.73Oct 22 15:11:15 pkdns2 sshd\[17774\]: Failed password for invalid user security from 206.189.30.73 port 46290 ssh2
...
2019-10-23 01:21:47
45.117.1.74 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 22-10-2019 12:45:36.
2019-10-23 01:43:43
51.68.126.45 attackspam
$f2bV_matches
2019-10-23 01:32:43
64.91.241.106 attack
Oct 22 09:33:34 server1 pure-ftpd: \(\?@64.91.241.106\) \[WARNING\] Authentication failed for user \[mimi\]\
Oct 22 09:33:43 server1 pure-ftpd: \(\?@64.91.241.106\) \[WARNING\] Authentication failed for user \[mingo\]\
Oct 22 13:45:30 server1 pure-ftpd: \(\?@64.91.241.106\) \[WARNING\] Authentication failed for user \[reading\]\
2019-10-23 01:39:24
200.233.220.185 attackspambots
2019-10-21 x@x
2019-10-21 09:19:58 unexpected disconnection while reading SMTP command from (200-233-220-185.static.ctbctelecom.com.br) [200.233.220.185]:33996 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=200.233.220.185
2019-10-23 01:23:36
205.185.120.190 attackspambots
web-1 [ssh_2] SSH Attack
2019-10-23 01:38:49
128.199.157.28 attackbots
Oct 22 13:59:44 tux-35-217 sshd\[24260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.157.28  user=root
Oct 22 13:59:47 tux-35-217 sshd\[24260\]: Failed password for root from 128.199.157.28 port 41381 ssh2
Oct 22 14:00:41 tux-35-217 sshd\[24273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.157.28  user=root
Oct 22 14:00:43 tux-35-217 sshd\[24273\]: Failed password for root from 128.199.157.28 port 33958 ssh2
...
2019-10-23 01:22:19
71.6.165.200 attackbots
Port scan: Attack repeated for 24 hours
2019-10-23 02:02:39
118.126.65.207 attackspambots
Oct 22 02:46:51 auw2 sshd\[3236\]: Invalid user anadir123 from 118.126.65.207
Oct 22 02:46:51 auw2 sshd\[3236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.65.207
Oct 22 02:46:53 auw2 sshd\[3236\]: Failed password for invalid user anadir123 from 118.126.65.207 port 58454 ssh2
Oct 22 02:52:26 auw2 sshd\[3673\]: Invalid user Doctor@2017 from 118.126.65.207
Oct 22 02:52:26 auw2 sshd\[3673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.65.207
2019-10-23 01:23:07
156.203.67.51 attackspam
445/tcp
[2019-10-22]1pkt
2019-10-23 01:51:18
124.236.22.54 attackbotsspam
Oct 22 06:00:31 auw2 sshd\[20306\]: Invalid user rafael123 from 124.236.22.54
Oct 22 06:00:31 auw2 sshd\[20306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.236.22.54
Oct 22 06:00:32 auw2 sshd\[20306\]: Failed password for invalid user rafael123 from 124.236.22.54 port 53682 ssh2
Oct 22 06:07:12 auw2 sshd\[20918\]: Invalid user guolei1983 from 124.236.22.54
Oct 22 06:07:12 auw2 sshd\[20918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.236.22.54
2019-10-23 01:32:12

Recently Reported IPs

174.20.32.105 67.84.163.70 116.128.179.234 47.218.2.63
188.159.97.26 39.119.243.31 35.119.224.93 22.133.27.44
85.72.223.41 92.241.132.55 145.52.70.89 85.234.111.178
38.47.104.245 226.115.54.193 145.16.161.215 82.215.35.74
20.157.73.170 130.77.146.192 35.64.252.162 21.83.48.201