Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.205.14.182
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26733
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.205.14.182.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 07:07:44 CST 2025
;; MSG SIZE  rcvd: 106
Host info
182.14.205.81.in-addr.arpa domain name pointer 81-205-14-182.fixed.kpn.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
182.14.205.81.in-addr.arpa	name = 81-205-14-182.fixed.kpn.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.131.60.38 attackbots
Unauthorized connection attempt detected from IP address 117.131.60.38 to port 2220 [J]
2020-01-16 19:35:17
196.188.240.13 attack
1579149913 - 01/16/2020 05:45:13 Host: 196.188.240.13/196.188.240.13 Port: 445 TCP Blocked
2020-01-16 19:51:05
46.38.144.32 attack
Jan 16 11:22:02 blackbee postfix/smtpd\[29505\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: authentication failure
Jan 16 11:22:37 blackbee postfix/smtpd\[29505\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: authentication failure
Jan 16 11:23:14 blackbee postfix/smtpd\[29505\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: authentication failure
Jan 16 11:23:48 blackbee postfix/smtpd\[29516\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: authentication failure
Jan 16 11:24:24 blackbee postfix/smtpd\[29505\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: authentication failure
...
2020-01-16 19:41:13
203.150.221.195 attack
Unauthorized connection attempt detected from IP address 203.150.221.195 to port 2220 [J]
2020-01-16 19:25:38
171.241.29.247 attackspam
Unauthorised access (Jan 16) SRC=171.241.29.247 LEN=52 TTL=109 ID=24352 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-16 19:19:39
52.66.206.135 attackbots
Unauthorized connection attempt detected from IP address 52.66.206.135 to port 2220 [J]
2020-01-16 19:47:55
59.95.211.203 attack
Unauthorized connection attempt from IP address 59.95.211.203 on Port 445(SMB)
2020-01-16 19:48:46
154.202.24.161 attack
Phishing Site: Brand au(KDDI) / http://au-ok[.]com/
2020-01-16 19:31:51
177.10.211.198 attack
Sending SPAM email
2020-01-16 19:51:23
125.27.203.202 attackspambots
1579149908 - 01/16/2020 05:45:08 Host: 125.27.203.202/125.27.203.202 Port: 445 TCP Blocked
2020-01-16 19:56:07
112.85.42.173 attackspambots
Triggered by Fail2Ban at Vostok web server
2020-01-16 19:31:31
114.32.153.15 attackbots
Unauthorized connection attempt detected from IP address 114.32.153.15 to port 2220 [J]
2020-01-16 19:32:23
114.99.29.162 attack
Brute force attempt
2020-01-16 19:38:15
185.89.101.108 attackspam
B: zzZZzz blocked content access
2020-01-16 19:43:52
54.202.172.151 attackspambots
helo=
2020-01-16 19:20:21

Recently Reported IPs

215.211.223.225 147.196.143.187 242.211.55.196 82.165.99.188
149.217.174.116 4.120.223.152 141.117.242.246 18.175.182.186
114.10.71.91 31.201.15.141 3.214.138.26 209.254.36.210
146.142.189.46 18.187.40.202 250.165.230.199 128.1.232.21
219.130.47.184 178.230.138.66 188.9.128.214 152.73.221.49