Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: Turk Telekomunikasyon Anonim Sirketi

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Unauthorized connection attempt from IP address 81.214.50.243 on Port 445(SMB)
2020-01-04 19:55:54
attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 02:16:03,535 INFO [shellcode_manager] (81.214.50.243) no match, writing hexdump (2f0fc60e99a39787a261f79e582cebf1 :1959037) - MS17010 (EternalBlue)
2019-06-27 10:19:17
Comments on same subnet:
IP Type Details Datetime
81.214.50.56 attack
Automatic report - Banned IP Access
2020-08-16 17:22:33
81.214.50.56 attackbotsspam
Automatic report - Banned IP Access
2020-07-12 16:52:06
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.214.50.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11229
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.214.50.243.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062602 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 27 10:19:12 CST 2019
;; MSG SIZE  rcvd: 117
Host info
243.50.214.81.in-addr.arpa domain name pointer 81.214.50.243.dynamic.ttnet.com.tr.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
243.50.214.81.in-addr.arpa	name = 81.214.50.243.dynamic.ttnet.com.tr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.156.185.149 attackbots
Sep 13 16:43:18 vps01 sshd[13122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.185.149
Sep 13 16:43:20 vps01 sshd[13122]: Failed password for invalid user 123456 from 124.156.185.149 port 27521 ssh2
2019-09-13 22:43:23
182.61.175.71 attackspambots
Sep 13 16:12:04 core sshd[3750]: Invalid user ubuntu from 182.61.175.71 port 58782
Sep 13 16:12:06 core sshd[3750]: Failed password for invalid user ubuntu from 182.61.175.71 port 58782 ssh2
...
2019-09-13 22:14:46
58.87.92.153 attackspam
Sep 13 09:01:02 xtremcommunity sshd\[41496\]: Invalid user 1 from 58.87.92.153 port 52144
Sep 13 09:01:02 xtremcommunity sshd\[41496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.92.153
Sep 13 09:01:04 xtremcommunity sshd\[41496\]: Failed password for invalid user 1 from 58.87.92.153 port 52144 ssh2
Sep 13 09:05:47 xtremcommunity sshd\[41552\]: Invalid user maria from 58.87.92.153 port 33430
Sep 13 09:05:47 xtremcommunity sshd\[41552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.92.153
...
2019-09-13 22:53:44
89.169.10.136 attackspam
Unauthorized connection attempt from IP address 89.169.10.136 on Port 445(SMB)
2019-09-13 22:22:37
123.163.20.84 attackbots
Unauthorized connection attempt from IP address 123.163.20.84 on Port 445(SMB)
2019-09-13 22:15:39
164.132.54.215 attackspam
Sep 13 04:17:05 lcdev sshd\[12420\]: Invalid user test from 164.132.54.215
Sep 13 04:17:05 lcdev sshd\[12420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=215.ip-164-132-54.eu
Sep 13 04:17:08 lcdev sshd\[12420\]: Failed password for invalid user test from 164.132.54.215 port 37292 ssh2
Sep 13 04:21:22 lcdev sshd\[12740\]: Invalid user deploy from 164.132.54.215
Sep 13 04:21:22 lcdev sshd\[12740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=215.ip-164-132-54.eu
2019-09-13 22:22:09
217.7.239.117 attackspambots
Sep 13 15:19:50 ArkNodeAT sshd\[32473\]: Invalid user git from 217.7.239.117
Sep 13 15:19:50 ArkNodeAT sshd\[32473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.7.239.117
Sep 13 15:19:52 ArkNodeAT sshd\[32473\]: Failed password for invalid user git from 217.7.239.117 port 63401 ssh2
2019-09-13 22:25:05
149.202.57.244 attack
2019-09-13T13:57:21.232081abusebot.cloudsearch.cf sshd\[6363\]: Invalid user user from 149.202.57.244 port 58664
2019-09-13 22:38:13
109.74.136.78 attackspambots
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-13 22:32:35
200.117.185.230 attack
$f2bV_matches
2019-09-13 22:49:22
187.19.127.246 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-09-13 22:14:07
96.30.100.78 attackspam
Unauthorized connection attempt from IP address 96.30.100.78 on Port 445(SMB)
2019-09-13 22:48:47
159.89.194.149 attackbots
Sep 13 14:45:13 game-panel sshd[23623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.149
Sep 13 14:45:15 game-panel sshd[23623]: Failed password for invalid user vboxuser from 159.89.194.149 port 50472 ssh2
Sep 13 14:50:14 game-panel sshd[23775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.149
2019-09-13 22:57:40
176.67.178.166 attack
445/tcp 445/tcp 445/tcp...
[2019-07-28/09-13]16pkt,1pt.(tcp)
2019-09-13 22:46:53
223.71.139.97 attack
Sep 13 15:00:48 srv206 sshd[10615]: Invalid user betty from 223.71.139.97
...
2019-09-13 22:27:40

Recently Reported IPs

177.159.239.20 200.57.250.72 71.110.247.255 101.0.38.6
178.84.211.123 122.87.39.193 186.227.36.225 18.171.6.189
11.49.230.98 28.116.159.226 17.187.33.30 3.64.197.61
70.64.21.83 181.186.159.55 87.104.115.40 102.22.174.51
103.127.28.143 155.34.129.131 233.125.22.9 210.48.56.94