Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: UEbach-Palenberg

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.210.161.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32129
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.210.161.39.			IN	A

;; AUTHORITY SECTION:
.			575	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122002 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 21 04:39:21 CST 2019
;; MSG SIZE  rcvd: 117
Host info
39.161.210.81.in-addr.arpa domain name pointer ip-81-210-161-39.hsi17.unitymediagroup.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.161.210.81.in-addr.arpa	name = ip-81-210-161-39.hsi17.unitymediagroup.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.50.112.72 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 03:50:36,609 INFO [amun_request_handler] PortScan Detected on Port: 445 (182.50.112.72)
2019-09-12 13:54:32
171.241.193.146 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 03:51:55,802 INFO [amun_request_handler] PortScan Detected on Port: 445 (171.241.193.146)
2019-09-12 13:42:15
103.39.133.110 attackspambots
Sep 12 07:38:40 eventyay sshd[27154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.39.133.110
Sep 12 07:38:43 eventyay sshd[27154]: Failed password for invalid user 123123 from 103.39.133.110 port 43222 ssh2
Sep 12 07:46:01 eventyay sshd[27301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.39.133.110
...
2019-09-12 14:03:03
157.230.116.99 attackspam
Sep 11 19:39:35 hpm sshd\[10917\]: Invalid user 1 from 157.230.116.99
Sep 11 19:39:35 hpm sshd\[10917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.116.99
Sep 11 19:39:38 hpm sshd\[10917\]: Failed password for invalid user 1 from 157.230.116.99 port 50088 ssh2
Sep 11 19:45:37 hpm sshd\[11507\]: Invalid user nagios1234 from 157.230.116.99
Sep 11 19:45:37 hpm sshd\[11507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.116.99
2019-09-12 13:48:30
187.0.211.99 attackbotsspam
Sep 12 05:39:57 game-panel sshd[15691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.0.211.99
Sep 12 05:40:00 game-panel sshd[15691]: Failed password for invalid user test from 187.0.211.99 port 55102 ssh2
Sep 12 05:47:21 game-panel sshd[15935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.0.211.99
2019-09-12 13:57:46
118.24.153.230 attackbots
Sep 12 01:13:34 plusreed sshd[26842]: Invalid user teamspeak3 from 118.24.153.230
...
2019-09-12 13:20:13
14.226.200.204 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 03:54:27,222 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.226.200.204)
2019-09-12 13:22:52
186.207.128.104 attackbotsspam
Sep 12 07:26:24 microserver sshd[46493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.207.128.104  user=root
Sep 12 07:26:26 microserver sshd[46493]: Failed password for root from 186.207.128.104 port 13487 ssh2
Sep 12 07:33:45 microserver sshd[47334]: Invalid user amsftp from 186.207.128.104 port 32975
Sep 12 07:33:45 microserver sshd[47334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.207.128.104
Sep 12 07:33:47 microserver sshd[47334]: Failed password for invalid user amsftp from 186.207.128.104 port 32975 ssh2
Sep 12 07:49:44 microserver sshd[49514]: Invalid user git from 186.207.128.104 port 33869
Sep 12 07:49:44 microserver sshd[49514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.207.128.104
Sep 12 07:49:46 microserver sshd[49514]: Failed password for invalid user git from 186.207.128.104 port 33869 ssh2
Sep 12 07:57:34 microserver sshd[50798]: Invalid user teams
2019-09-12 13:26:14
211.195.12.33 attackspam
Sep 12 01:10:54 xtremcommunity sshd\[4852\]: Invalid user demo from 211.195.12.33 port 34685
Sep 12 01:10:54 xtremcommunity sshd\[4852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33
Sep 12 01:10:56 xtremcommunity sshd\[4852\]: Failed password for invalid user demo from 211.195.12.33 port 34685 ssh2
Sep 12 01:17:51 xtremcommunity sshd\[4947\]: Invalid user vncuser from 211.195.12.33 port 37683
Sep 12 01:17:51 xtremcommunity sshd\[4947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33
...
2019-09-12 13:44:45
118.171.173.103 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 03:50:39,613 INFO [amun_request_handler] PortScan Detected on Port: 445 (118.171.173.103)
2019-09-12 13:52:41
198.199.83.143 attackbotsspam
Sep 12 08:04:47 vps01 sshd[4719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.83.143
Sep 12 08:04:49 vps01 sshd[4719]: Failed password for invalid user nagios from 198.199.83.143 port 48546 ssh2
2019-09-12 14:09:45
178.128.55.49 attackspam
Sep 12 07:55:38 yabzik sshd[10888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.49
Sep 12 07:55:39 yabzik sshd[10888]: Failed password for invalid user steam from 178.128.55.49 port 42876 ssh2
Sep 12 08:03:00 yabzik sshd[13398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.49
2019-09-12 13:16:34
110.188.70.99 attackbotsspam
Sep 12 07:52:01 eventyay sshd[27364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.188.70.99
Sep 12 07:52:04 eventyay sshd[27364]: Failed password for invalid user admin from 110.188.70.99 port 30619 ssh2
Sep 12 07:57:28 eventyay sshd[27423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.188.70.99
...
2019-09-12 14:04:37
14.153.76.8 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 03:54:15,199 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.153.76.8)
2019-09-12 13:27:13
2.193.1.159 attack
2019-09-12T05:54:54.090497mail01 postfix/smtpd[15131]: warning: unknown[2.193.1.159]: SASL PLAIN authentication failed:
2019-09-12T05:55:20.405127mail01 postfix/smtpd[15131]: warning: unknown[2.193.1.159]: SASL PLAIN authentication failed:
2019-09-12T05:56:51.079480mail01 postfix/smtpd[31622]: warning: unknown[2.193.1.159]: SASL PLAIN authentication failed:
2019-09-12 14:11:48

Recently Reported IPs

208.59.128.69 185.208.175.178 80.18.167.198 42.225.94.201
190.232.58.19 121.181.248.216 90.79.167.95 161.23.58.167
106.13.130.133 66.12.236.215 3.220.209.194 121.179.162.92
56.193.76.9 3.10.195.75 56.50.68.66 108.213.5.240
216.236.235.39 47.222.130.247 109.72.207.29 179.228.13.70