Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Krakow

Region: Lesser Poland

Country: Poland

Internet Service Provider: Netia

Hostname: unknown

Organization: Netia SA

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.219.245.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27197
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.219.245.135.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 28 20:16:11 CST 2019
;; MSG SIZE  rcvd: 118

Host info
135.245.219.81.in-addr.arpa domain name pointer ip81219245135.artus.net.pl.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
135.245.219.81.in-addr.arpa	name = ip81219245135.artus.net.pl.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
121.121.118.209 attackspam
Automatic report - Port Scan Attack
2020-01-14 22:02:24
54.37.159.12 attack
Unauthorized connection attempt detected from IP address 54.37.159.12 to port 2220 [J]
2020-01-14 22:23:29
117.158.66.137 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-14 22:25:05
37.49.231.164 attack
Unauthorized connection attempt detected from IP address 37.49.231.164 to port 23 [J]
2020-01-14 22:24:38
79.11.158.185 attack
1579007023 - 01/14/2020 14:03:43 Host: 79.11.158.185/79.11.158.185 Port: 445 TCP Blocked
2020-01-14 22:40:41
39.36.169.51 attack
Lines containing failures of 39.36.169.51
Jan 14 13:42:07 shared12 sshd[23797]: Invalid user ge from 39.36.169.51 port 60762
Jan 14 13:42:07 shared12 sshd[23797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.36.169.51
Jan 14 13:42:09 shared12 sshd[23797]: Failed password for invalid user ge from 39.36.169.51 port 60762 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=39.36.169.51
2020-01-14 22:08:25
140.82.23.29 attack
Jan 14 14:45:51 ns37 sshd[7949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.82.23.29
2020-01-14 22:19:25
222.186.42.136 attackbotsspam
14.01.2020 14:11:43 SSH access blocked by firewall
2020-01-14 22:12:23
51.68.200.151 attackspambots
Port scan on 2 port(s): 139 445
2020-01-14 22:05:13
115.159.3.221 attackbotsspam
Jan 14 14:04:20 vmanager6029 sshd\[5412\]: Invalid user monitor from 115.159.3.221 port 44314
Jan 14 14:04:20 vmanager6029 sshd\[5412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.3.221
Jan 14 14:04:22 vmanager6029 sshd\[5412\]: Failed password for invalid user monitor from 115.159.3.221 port 44314 ssh2
2020-01-14 22:06:25
81.241.207.133 attack
Automatic report - Port Scan Attack
2020-01-14 22:28:32
176.232.181.179 attackbots
Unauthorized connection attempt detected from IP address 176.232.181.179 to port 23 [J]
2020-01-14 22:28:56
113.131.118.5 attackspam
firewall-block, port(s): 8080/tcp
2020-01-14 22:25:42
142.11.236.143 attackbots
CVE-2019-19781
2020-01-14 22:06:01
110.53.234.106 attack
ICMP MH Probe, Scan /Distributed -
2020-01-14 22:35:16

Recently Reported IPs

167.99.10.211 113.194.227.162 103.200.46.120 107.42.45.136
217.243.169.56 131.55.19.144 131.173.224.63 96.46.168.80
165.254.160.177 37.187.78.170 70.144.54.85 152.174.157.49
103.56.114.210 140.211.13.198 137.37.89.168 45.40.192.196
207.163.203.75 224.181.85.45 133.74.29.150 62.68.54.41