Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.220.106.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23586
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.220.106.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 06:26:17 CST 2025
;; MSG SIZE  rcvd: 107
Host info
138.106.220.81.in-addr.arpa domain name pointer 138.106.220.81.rev.sfr.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.106.220.81.in-addr.arpa	name = 138.106.220.81.rev.sfr.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.16.37.135 attackbotsspam
$f2bV_matches
2020-08-04 15:56:37
103.89.89.164 attack
SSH Scan
2020-08-04 15:36:16
115.178.48.38 attackspambots
$f2bV_matches
2020-08-04 15:44:33
195.154.62.39 attackbotsspam
Wordpress /admin/
2020-08-04 15:37:06
27.156.6.232 attackbotsspam
SSH Brute-Force attacks
2020-08-04 15:50:12
103.215.27.254 attackbotsspam
Unauthorized connection attempt detected from IP address 103.215.27.254 to port 445
2020-08-04 16:01:20
113.165.72.26 attackspam
Icarus honeypot on github
2020-08-04 16:01:01
185.204.2.153 attackspam
20 attempts against mh-ssh on cloud
2020-08-04 16:05:28
218.92.0.216 attackspam
Aug  4 09:35:06 vps sshd[939989]: Failed password for root from 218.92.0.216 port 32071 ssh2
Aug  4 09:35:08 vps sshd[939989]: Failed password for root from 218.92.0.216 port 32071 ssh2
Aug  4 09:35:17 vps sshd[945053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.216  user=root
Aug  4 09:35:19 vps sshd[945053]: Failed password for root from 218.92.0.216 port 46960 ssh2
Aug  4 09:35:22 vps sshd[945053]: Failed password for root from 218.92.0.216 port 46960 ssh2
...
2020-08-04 15:38:08
107.170.37.74 attackspam
Aug  4 05:45:41 vps647732 sshd[3220]: Failed password for root from 107.170.37.74 port 49328 ssh2
...
2020-08-04 15:55:54
72.11.135.222 attack
Aug  4 05:48:02 mail.srvfarm.net postfix/smtpd[1215479]: warning: unknown[72.11.135.222]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  4 05:48:02 mail.srvfarm.net postfix/smtpd[1215479]: lost connection after AUTH from unknown[72.11.135.222]
Aug  4 05:48:09 mail.srvfarm.net postfix/smtpd[1215470]: warning: unknown[72.11.135.222]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  4 05:48:09 mail.srvfarm.net postfix/smtpd[1215470]: lost connection after AUTH from unknown[72.11.135.222]
Aug  4 05:48:20 mail.srvfarm.net postfix/smtpd[1214558]: warning: unknown[72.11.135.222]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-08-04 16:12:35
132.232.59.247 attackbots
$f2bV_matches
2020-08-04 15:51:38
138.255.35.77 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-08-04 16:10:11
1.4.186.39 attackbotsspam
Automatic report - Port Scan Attack
2020-08-04 15:58:32
119.96.120.113 attack
2020-08-04T05:54:14.803792ks3355764 sshd[27761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.120.113  user=root
2020-08-04T05:54:16.631101ks3355764 sshd[27761]: Failed password for root from 119.96.120.113 port 57980 ssh2
...
2020-08-04 15:37:45

Recently Reported IPs

32.248.227.73 66.114.147.37 19.102.54.166 7.235.120.191
253.133.240.242 144.238.10.129 103.204.232.159 114.169.25.142
216.25.238.118 97.255.218.153 157.207.44.124 238.171.55.247
226.186.29.151 188.215.153.177 231.93.167.242 123.51.195.214
129.89.96.167 89.226.98.243 131.102.82.145 122.25.54.224