Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
81.217.30.100 attackspam
Automatic report - Port Scan Attack
2020-03-19 01:11:52
81.217.30.100 attack
port
2020-03-13 12:56:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.217.30.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29832
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.217.30.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:49:37 CST 2025
;; MSG SIZE  rcvd: 105
Host info
21.30.217.81.in-addr.arpa domain name pointer h081217030021.dyn.cm.kabsi.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.30.217.81.in-addr.arpa	name = h081217030021.dyn.cm.kabsi.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
39.97.189.8 attackspambots
39.97.189.8 - - \[23/Nov/2019:14:21:38 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
39.97.189.8 - - \[23/Nov/2019:14:21:40 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-24 03:19:44
221.160.100.14 attackbots
Nov 23 14:05:04 woltan sshd[29814]: Failed password for invalid user postgres from 221.160.100.14 port 35160 ssh2
2019-11-24 03:00:58
185.176.27.54 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-24 02:47:25
188.65.90.181 attack
Automatic report - Port Scan Attack
2019-11-24 02:55:39
168.195.206.18 attackbotsspam
...
2019-11-24 02:50:44
178.14.41.96 attackspambots
Nov 23 15:13:37 tux-35-217 sshd\[18086\]: Invalid user discovery from 178.14.41.96 port 36550
Nov 23 15:13:37 tux-35-217 sshd\[18086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.14.41.96
Nov 23 15:13:39 tux-35-217 sshd\[18086\]: Failed password for invalid user discovery from 178.14.41.96 port 36550 ssh2
Nov 23 15:21:52 tux-35-217 sshd\[18133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.14.41.96  user=root
...
2019-11-24 03:13:26
159.203.201.127 attack
1574527287 - 11/23/2019 17:41:27 Host: 159.203.201.127/159.203.201.127 Port: 143 TCP Blocked
2019-11-24 02:59:40
142.93.215.102 attackbots
2019-11-23T16:36:59.488274abusebot-5.cloudsearch.cf sshd\[9478\]: Invalid user desmond from 142.93.215.102 port 54622
2019-11-24 03:07:54
103.42.57.177 attackbotsspam
[Aegis] @ 2019-11-23 14:22:04  0000 -> Common web attack.
2019-11-24 03:09:52
187.141.128.42 attackspambots
Nov 23 17:44:46 mout sshd[6478]: Invalid user yyy!@#$%^&* from 187.141.128.42 port 49836
2019-11-24 03:21:51
185.156.1.99 attackbotsspam
Nov 23 16:26:18 vmd38886 sshd\[3170\]: Invalid user davoud from 185.156.1.99 port 57636
Nov 23 16:26:18 vmd38886 sshd\[3170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.156.1.99
Nov 23 16:26:20 vmd38886 sshd\[3170\]: Failed password for invalid user davoud from 185.156.1.99 port 57636 ssh2
2019-11-24 02:57:05
119.250.215.85 attackbots
badbot
2019-11-24 03:12:54
114.105.168.20 attackbotsspam
badbot
2019-11-24 03:05:04
83.97.20.46 attackbots
Telnet Server BruteForce Attack
2019-11-24 02:47:08
51.83.138.91 attackbotsspam
51.83.138.91 was recorded 21 times by 16 hosts attempting to connect to the following ports: 33891,33890,33389,3391,33892,33896,3399,23389,13389,33899,63389,3390. Incident counter (4h, 24h, all-time): 21, 87, 4492
2019-11-24 03:07:30

Recently Reported IPs

115.205.186.228 198.126.89.36 201.32.191.52 22.124.153.169
39.195.23.214 115.241.66.249 132.104.113.133 14.47.54.16
27.111.228.86 17.17.8.197 125.175.19.125 135.198.1.61
241.75.73.89 96.105.218.0 194.118.84.179 171.91.170.84
202.44.234.130 247.178.251.215 60.224.141.141 200.146.64.87