Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: green.ch AG

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
81.221.234.204 attack
Jul  5 10:55:05 sip sshd[842341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.221.234.204 
Jul  5 10:55:05 sip sshd[842341]: Invalid user mb from 81.221.234.204 port 17845
Jul  5 10:55:07 sip sshd[842341]: Failed password for invalid user mb from 81.221.234.204 port 17845 ssh2
...
2020-07-05 16:58:16
81.221.234.204 attackspambots
(sshd) Failed SSH login from 81.221.234.204 (CH/Switzerland/204-234-221-81.pool.dsl-net.ch): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 20 06:48:38 amsweb01 sshd[14761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.221.234.204  user=admin
Jun 20 06:48:41 amsweb01 sshd[14761]: Failed password for admin from 81.221.234.204 port 43858 ssh2
Jun 20 07:08:12 amsweb01 sshd[17778]: Invalid user summit from 81.221.234.204 port 52725
Jun 20 07:08:13 amsweb01 sshd[17778]: Failed password for invalid user summit from 81.221.234.204 port 52725 ssh2
Jun 20 07:19:16 amsweb01 sshd[19457]: Invalid user www from 81.221.234.204 port 32728
2020-06-20 13:47:36
81.221.254.153 attackspambots
SSH login attempts.
2020-06-19 14:47:51
81.221.234.204 attackspambots
Brute-force attempt banned
2020-06-19 00:07:04
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.221.2.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52696
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.221.2.124.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 07 00:34:02 CST 2019
;; MSG SIZE  rcvd: 116
Host info
124.2.221.81.in-addr.arpa domain name pointer 124-2-221-81.static.dsl-net.ch.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
124.2.221.81.in-addr.arpa	name = 124-2-221-81.static.dsl-net.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.38.160.4 attackbots
Invalid user qir from 54.38.160.4 port 41332
2020-05-20 20:14:33
201.18.97.90 attackbots
Unauthorized connection attempt from IP address 201.18.97.90 on Port 445(SMB)
2020-05-20 20:38:56
36.73.148.87 attackspam
Web Server Attack
2020-05-20 20:22:46
167.71.76.122 attack
Invalid user wns from 167.71.76.122 port 39520
2020-05-20 20:33:07
49.233.192.22 attack
$f2bV_matches
2020-05-20 20:43:29
49.232.72.56 attackbotsspam
478. On May 17 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 49.232.72.56.
2020-05-20 20:47:23
167.71.132.227 attack
xmlrpc attack
2020-05-20 20:39:28
103.129.220.40 attackbots
$f2bV_matches
2020-05-20 20:37:11
180.76.108.73 attack
May 20 14:33:08 abendstille sshd\[13353\]: Invalid user mhy from 180.76.108.73
May 20 14:33:08 abendstille sshd\[13353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.108.73
May 20 14:33:10 abendstille sshd\[13353\]: Failed password for invalid user mhy from 180.76.108.73 port 43976 ssh2
May 20 14:38:13 abendstille sshd\[18768\]: Invalid user vmz from 180.76.108.73
May 20 14:38:13 abendstille sshd\[18768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.108.73
...
2020-05-20 20:44:46
203.130.23.2 attack
Unauthorized connection attempt from IP address 203.130.23.2 on Port 445(SMB)
2020-05-20 20:47:53
58.87.75.178 attackbots
May 20 14:10:45 plex sshd[31592]: Invalid user zqrong from 58.87.75.178 port 43156
2020-05-20 20:11:23
161.82.141.154 attackbotsspam
Unauthorized connection attempt from IP address 161.82.141.154 on Port 445(SMB)
2020-05-20 20:50:17
51.158.77.33 attack
16 May 2020
07:42:13 SRC=51.158.77.33 DPT=22
18:19:57 SRC=51.158.77.33 DPT=22
21:12:25 SRC=51.158.77.33 DPT=22
2020-05-20 20:32:01
180.183.122.182 attackbotsspam
[Wed May 20 06:04:13 2020] - Syn Flood From IP: 180.183.122.182 Port: 13370
2020-05-20 20:27:44
158.175.132.234 attackspam
Invalid user jmt from 158.175.132.234 port 60260
2020-05-20 20:31:24

Recently Reported IPs

162.227.90.98 38.254.35.219 2403:6200:8816:5dd:8445:5ef8:76d3:1d5 221.158.203.101
100.186.29.236 206.186.25.237 162.210.237.171 107.175.167.75
42.43.9.123 44.146.91.130 23.204.70.228 1.36.228.84
100.197.157.151 80.28.45.80 152.136.214.13 214.146.130.9
53.14.153.254 32.119.138.81 213.41.32.158 54.218.230.50