Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Türkiye

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.215.96.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32011
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.215.96.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 05:53:31 CST 2025
;; MSG SIZE  rcvd: 105
Host info
34.96.215.81.in-addr.arpa domain name pointer 81.215.96.34.dynamic.ttnet.com.tr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.96.215.81.in-addr.arpa	name = 81.215.96.34.dynamic.ttnet.com.tr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
136.232.17.130 attackbotsspam
Unauthorized connection attempt from IP address 136.232.17.130 on Port 445(SMB)
2019-08-17 06:32:23
191.253.47.10 attackspam
Aug 16 09:55:50 friendsofhawaii sshd\[11368\]: Invalid user anna from 191.253.47.10
Aug 16 09:55:50 friendsofhawaii sshd\[11368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.253.47.10
Aug 16 09:55:52 friendsofhawaii sshd\[11368\]: Failed password for invalid user anna from 191.253.47.10 port 58458 ssh2
Aug 16 10:04:28 friendsofhawaii sshd\[12106\]: Invalid user steam from 191.253.47.10
Aug 16 10:04:28 friendsofhawaii sshd\[12106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.253.47.10
2019-08-17 05:58:28
117.255.216.106 attackbots
Aug 16 12:08:31 wbs sshd\[22363\]: Invalid user diana from 117.255.216.106
Aug 16 12:08:31 wbs sshd\[22363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.255.216.106
Aug 16 12:08:34 wbs sshd\[22363\]: Failed password for invalid user diana from 117.255.216.106 port 55252 ssh2
Aug 16 12:13:38 wbs sshd\[23088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.255.216.106  user=root
Aug 16 12:13:41 wbs sshd\[23088\]: Failed password for root from 117.255.216.106 port 55252 ssh2
2019-08-17 06:15:36
49.231.190.149 attackspambots
Unauthorized connection attempt from IP address 49.231.190.149 on Port 445(SMB)
2019-08-17 06:16:27
46.105.110.79 attackspambots
Aug 16 09:59:55 hiderm sshd\[2312\]: Invalid user lire from 46.105.110.79
Aug 16 09:59:55 hiderm sshd\[2312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=marocgeo-r.com
Aug 16 09:59:57 hiderm sshd\[2312\]: Failed password for invalid user lire from 46.105.110.79 port 53944 ssh2
Aug 16 10:04:07 hiderm sshd\[2695\]: Invalid user master from 46.105.110.79
Aug 16 10:04:07 hiderm sshd\[2695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=marocgeo-r.com
2019-08-17 06:24:56
144.217.5.73 attack
Invalid user student04 from 144.217.5.73 port 48964
2019-08-17 06:11:07
106.12.89.171 attackbots
$f2bV_matches
2019-08-17 06:05:21
4.16.253.10 attackbots
Aug 16 21:37:56 hcbbdb sshd\[20858\]: Invalid user kfserver from 4.16.253.10
Aug 16 21:37:56 hcbbdb sshd\[20858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bmx2.aafp.org
Aug 16 21:37:57 hcbbdb sshd\[20858\]: Failed password for invalid user kfserver from 4.16.253.10 port 39008 ssh2
Aug 16 21:44:44 hcbbdb sshd\[21630\]: Invalid user sysadmin from 4.16.253.10
Aug 16 21:44:44 hcbbdb sshd\[21630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bmx2.aafp.org
2019-08-17 06:03:45
162.214.14.3 attack
Aug 16 12:03:12 php1 sshd\[23754\]: Invalid user ast3r1sk from 162.214.14.3
Aug 16 12:03:12 php1 sshd\[23754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=server.etaaleem.com
Aug 16 12:03:15 php1 sshd\[23754\]: Failed password for invalid user ast3r1sk from 162.214.14.3 port 44776 ssh2
Aug 16 12:07:38 php1 sshd\[24307\]: Invalid user stacy from 162.214.14.3
Aug 16 12:07:38 php1 sshd\[24307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=server.etaaleem.com
2019-08-17 06:13:11
185.155.18.58 attack
Unauthorized connection attempt from IP address 185.155.18.58 on Port 445(SMB)
2019-08-17 06:26:06
114.34.109.184 attackbots
$f2bV_matches_ltvn
2019-08-17 06:12:18
178.128.201.224 attackbotsspam
Aug 12 10:11:17 *** sshd[2728]: Failed password for invalid user agustina from 178.128.201.224 port 36782 ssh2
Aug 12 10:19:37 *** sshd[2810]: Failed password for invalid user valefor from 178.128.201.224 port 52094 ssh2
Aug 16 17:48:39 *** sshd[25470]: Failed password for invalid user cod from 178.128.201.224 port 35190 ssh2
Aug 16 17:53:41 *** sshd[25533]: Failed password for invalid user es from 178.128.201.224 port 54144 ssh2
2019-08-17 05:59:38
171.244.51.114 attackbotsspam
Aug 16 12:12:01 auw2 sshd\[24578\]: Invalid user f1 from 171.244.51.114
Aug 16 12:12:01 auw2 sshd\[24578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.51.114
Aug 16 12:12:04 auw2 sshd\[24578\]: Failed password for invalid user f1 from 171.244.51.114 port 46776 ssh2
Aug 16 12:19:33 auw2 sshd\[25178\]: Invalid user stefania from 171.244.51.114
Aug 16 12:19:33 auw2 sshd\[25178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.51.114
2019-08-17 06:24:11
91.214.114.7 attackbotsspam
Aug 16 12:00:15 php2 sshd\[25063\]: Invalid user delta from 91.214.114.7
Aug 16 12:00:15 php2 sshd\[25063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.214.114.7
Aug 16 12:00:17 php2 sshd\[25063\]: Failed password for invalid user delta from 91.214.114.7 port 54346 ssh2
Aug 16 12:05:15 php2 sshd\[25567\]: Invalid user web from 91.214.114.7
Aug 16 12:05:15 php2 sshd\[25567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.214.114.7
2019-08-17 06:18:27
177.71.74.230 attack
Aug 16 11:58:58 tdfoods sshd\[19793\]: Invalid user administrator from 177.71.74.230
Aug 16 11:58:58 tdfoods sshd\[19793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.71.74.230
Aug 16 11:59:01 tdfoods sshd\[19793\]: Failed password for invalid user administrator from 177.71.74.230 port 40036 ssh2
Aug 16 12:04:03 tdfoods sshd\[20284\]: Invalid user support from 177.71.74.230
Aug 16 12:04:03 tdfoods sshd\[20284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.71.74.230
2019-08-17 06:07:07

Recently Reported IPs

200.239.55.134 141.168.63.221 168.242.232.87 46.197.202.199
76.117.123.86 171.44.117.226 212.171.179.30 81.71.177.94
74.231.232.211 3.31.148.177 51.58.164.75 7.230.201.239
171.151.162.34 242.6.11.255 155.250.49.51 35.37.71.72
15.137.191.196 78.248.12.196 172.128.72.120 67.10.41.133