Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.229.149.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39806
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.229.149.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:45:39 CST 2025
;; MSG SIZE  rcvd: 106
Host info
52.149.229.81.in-addr.arpa domain name pointer 81-229-149-52-no600.tbcn.telia.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.149.229.81.in-addr.arpa	name = 81-229-149-52-no600.tbcn.telia.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.168.254.108 spambotsattackproxynormal
UDP Port Scan Attacker
2021-12-26 22:25:25
197.253.204.202 spambotsattackproxynormal
mnaciri172@gmail.com
2022-01-14 05:39:11
31.204.150.150 attack
Constant attacks on my servers
2022-01-24 03:46:02
84.17.49.62 attack
Qnap attack on admin username
2022-01-18 07:28:12
183.63.253.113 spambotsattackproxynormal
Iya
2022-01-12 12:36:02
45.253.65.73 attack
Get impossible
2022-01-11 18:26:34
105.112.181.24 bots
Trying to phish info with job scam
2021-12-28 08:04:03
159.203.37.156 botsattack
Spambot attack
2022-01-24 07:04:51
187.252.206.170 spambotsattackproxynormal
Level
2022-01-15 11:44:12
217.64.148.126 attack
Attack my server
2021-12-28 01:58:21
91.241.19.69 attack
Multiple failed login attempts were made by 91.241.19.69 using the RDP protocol
2022-01-02 23:12:57
45.227.254.79 attack
45.227.254.79 - - [11/Jan/2022 19:27:20] code 400, message Bad HTTP/0.9 request type ('\\x03\\x00\\x00/*à\\x00\\x00\\x00\\x00\\x00Cookie:')
45.227.254.79 - - [11/Jan/2022 19:27:20] "♥  /*à     Cookie: mstshash=Administr" 400 -
45.227.254.79 - - [11/Jan/2022 19:27:20] code 400, message Bad HTTP/0.9 request type ('\\x03\\x00\\x00/*à\\x00\\x00\\x00\\x00\\x00Cookie:')
45.227.254.79 - - [11/Jan/2022 19:27:20] "♥  /*à     Cookie: mstshash=Administr" 400 -
2022-01-12 03:00:09
208.67.220.220 proxy
Key
2021-12-27 07:23:40
203.0.113.42 spambotsattackproxynormal
Da
2021-12-29 20:36:02
206.189.32.154 spambotsattackproxynormal
Cheat slot jkttogel
2022-01-23 04:51:35

Recently Reported IPs

241.127.188.150 175.237.146.208 25.223.252.230 224.171.149.70
152.67.161.136 16.100.6.58 225.196.229.139 31.237.130.73
166.174.226.13 222.99.46.52 250.11.16.49 193.130.162.126
96.234.251.205 34.107.139.131 70.84.75.86 132.46.87.255
212.19.166.25 92.160.134.26 8.17.50.144 189.191.243.213