Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sundsvall

Region: Vasternorrlands

Country: Sweden

Internet Service Provider: Telia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.234.218.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23715
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.234.218.135.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025040501 1800 900 604800 86400

;; Query time: 150 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 06 12:23:28 CST 2025
;; MSG SIZE  rcvd: 107
Host info
135.218.234.81.in-addr.arpa domain name pointer 81-234-218-135-no600.tbcn.telia.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.218.234.81.in-addr.arpa	name = 81-234-218-135-no600.tbcn.telia.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.235.7.47 attackspambots
Nov 16 22:13:29 lnxmysql61 sshd[525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.7.47
2019-11-17 06:15:27
51.68.11.195 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-17 06:28:13
49.145.200.38 attackspambots
Unauthorised access (Nov 16) SRC=49.145.200.38 LEN=52 TTL=117 ID=27467 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-17 06:02:39
51.77.201.36 attackspam
1573915455 - 11/16/2019 15:44:15 Host: 51.77.201.36/51.77.201.36 Port: 22 TCP Blocked
2019-11-17 06:20:23
195.132.119.52 attackbotsspam
Fail2Ban Ban Triggered
2019-11-17 06:22:35
178.93.36.126 attack
port scan and connect, tcp 23 (telnet)
2019-11-17 05:52:16
148.70.62.12 attack
Nov 16 22:58:56 MK-Soft-VM5 sshd[31453]: Failed password for root from 148.70.62.12 port 47072 ssh2
...
2019-11-17 06:14:43
106.13.23.105 attack
Nov 16 18:48:21 vps691689 sshd[15684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.23.105
Nov 16 18:48:23 vps691689 sshd[15684]: Failed password for invalid user dupuits from 106.13.23.105 port 53184 ssh2
Nov 16 18:53:56 vps691689 sshd[15757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.23.105
...
2019-11-17 05:56:29
185.175.93.17 attack
11/16/2019-17:18:20.855557 185.175.93.17 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-17 06:18:29
186.31.116.78 attackspambots
Nov 16 23:01:43 dedicated sshd[21266]: Invalid user molly from 186.31.116.78 port 47500
2019-11-17 06:19:40
221.216.212.35 attackspam
Nov 16 21:08:33 server sshd\[5223\]: Invalid user ubuntu from 221.216.212.35
Nov 16 21:08:33 server sshd\[5223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.216.212.35 
Nov 16 21:08:35 server sshd\[5223\]: Failed password for invalid user ubuntu from 221.216.212.35 port 8835 ssh2
Nov 16 21:15:41 server sshd\[7927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.216.212.35  user=root
Nov 16 21:15:43 server sshd\[7927\]: Failed password for root from 221.216.212.35 port 36306 ssh2
...
2019-11-17 06:12:45
88.99.95.219 attackspambots
SSH bruteforce (Triggered fail2ban)
2019-11-17 05:53:38
185.208.211.141 attackspambots
Relay mail to danivela1029@gmail.com
2019-11-17 06:08:02
166.62.32.32 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-11-17 06:05:23
105.112.98.59 attack
Unauthorized connection attempt from IP address 105.112.98.59 on Port 445(SMB)
2019-11-17 05:50:50

Recently Reported IPs

147.226.2.81 59.82.83.179 59.82.83.100 59.82.83.212
59.82.83.38 59.82.83.209 59.82.83.186 59.82.83.15
59.82.83.104 5.196.243.98 167.71.46.248 47.30.230.216
47.30.230.45 175.187.162.9 37.111.181.85 84.201.181.85
60.67.194.101 205.210.31.201 71.239.74.83 187.26.222.133