Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: Telia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.239.200.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.239.200.136.			IN	A

;; AUTHORITY SECTION:
.			438	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090901 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 10 08:03:19 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 136.200.239.81.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.200.239.81.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.67.74.49 attack
Dec 17 07:30:44 51-15-180-239 sshd[22460]: Invalid user ubuntu from 114.67.74.49 port 45740
...
2019-12-17 15:01:17
222.186.175.150 attackbots
Dec 17 08:28:25 Ubuntu-1404-trusty-64-minimal sshd\[27645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Dec 17 08:28:27 Ubuntu-1404-trusty-64-minimal sshd\[27645\]: Failed password for root from 222.186.175.150 port 31930 ssh2
Dec 17 08:28:43 Ubuntu-1404-trusty-64-minimal sshd\[27830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Dec 17 08:28:45 Ubuntu-1404-trusty-64-minimal sshd\[27830\]: Failed password for root from 222.186.175.150 port 55554 ssh2
Dec 17 08:29:09 Ubuntu-1404-trusty-64-minimal sshd\[28089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
2019-12-17 15:29:48
51.91.8.222 attackbotsspam
Dec 16 20:56:30 eddieflores sshd\[17411\]: Invalid user jira from 51.91.8.222
Dec 16 20:56:30 eddieflores sshd\[17411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.ip-51-91-8.eu
Dec 16 20:56:32 eddieflores sshd\[17411\]: Failed password for invalid user jira from 51.91.8.222 port 33930 ssh2
Dec 16 21:01:45 eddieflores sshd\[17993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.ip-51-91-8.eu  user=root
Dec 16 21:01:47 eddieflores sshd\[17993\]: Failed password for root from 51.91.8.222 port 43442 ssh2
2019-12-17 15:04:34
104.238.110.156 attack
Nov 16 19:39:53 vtv3 sshd[14228]: Invalid user home from 104.238.110.156 port 54490
Nov 16 19:39:53 vtv3 sshd[14228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.238.110.156
Nov 16 19:39:55 vtv3 sshd[14228]: Failed password for invalid user home from 104.238.110.156 port 54490 ssh2
Nov 16 19:43:16 vtv3 sshd[15188]: Invalid user jenna from 104.238.110.156 port 34744
Nov 16 19:43:16 vtv3 sshd[15188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.238.110.156
Dec 17 05:54:26 vtv3 sshd[14536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.238.110.156 
Dec 17 05:54:27 vtv3 sshd[14536]: Failed password for invalid user tw from 104.238.110.156 port 43298 ssh2
Dec 17 06:01:23 vtv3 sshd[18052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.238.110.156 
Dec 17 06:12:24 vtv3 sshd[23039]: pam_unix(sshd:auth): authentication failure; lognam
2019-12-17 15:21:18
180.211.153.230 attack
Unauthorised access (Dec 17) SRC=180.211.153.230 LEN=52 TTL=112 ID=28381 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-17 15:27:32
58.208.16.171 attackbots
$f2bV_matches
2019-12-17 15:22:59
159.203.88.222 attack
Dec 17 13:39:05 itv-usvr-01 sshd[5874]: Invalid user nunez from 159.203.88.222
Dec 17 13:39:05 itv-usvr-01 sshd[5874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.88.222
Dec 17 13:39:05 itv-usvr-01 sshd[5874]: Invalid user nunez from 159.203.88.222
Dec 17 13:39:07 itv-usvr-01 sshd[5874]: Failed password for invalid user nunez from 159.203.88.222 port 38146 ssh2
Dec 17 13:45:05 itv-usvr-01 sshd[6137]: Invalid user server from 159.203.88.222
2019-12-17 15:15:08
194.135.93.49 attack
Dec 17 09:30:04 hosting sshd[2940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2jdv.c.time4vps.cloud  user=root
Dec 17 09:30:06 hosting sshd[2940]: Failed password for root from 194.135.93.49 port 56876 ssh2
...
2019-12-17 14:57:27
79.137.86.43 attackbotsspam
Dec 17 08:20:30 mail sshd[19503]: Failed password for dovecot from 79.137.86.43 port 40914 ssh2
Dec 17 08:25:37 mail sshd[21597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.86.43 
Dec 17 08:25:39 mail sshd[21597]: Failed password for invalid user duncan from 79.137.86.43 port 45212 ssh2
2019-12-17 15:33:07
222.122.203.107 attackspambots
Dec 17 08:19:00 mail sshd[18520]: Failed password for root from 222.122.203.107 port 39160 ssh2
Dec 17 08:27:50 mail sshd[22475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.122.203.107 
Dec 17 08:27:53 mail sshd[22475]: Failed password for invalid user hiep from 222.122.203.107 port 49134 ssh2
2019-12-17 15:30:08
201.236.240.145 attackspambots
1576564200 - 12/17/2019 07:30:00 Host: 201.236.240.145/201.236.240.145 Port: 445 TCP Blocked
2019-12-17 15:12:36
5.135.101.228 attack
Dec 17 06:56:55 hcbbdb sshd\[6961\]: Invalid user admin from 5.135.101.228
Dec 17 06:56:55 hcbbdb sshd\[6961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=noxia.org
Dec 17 06:56:57 hcbbdb sshd\[6961\]: Failed password for invalid user admin from 5.135.101.228 port 60042 ssh2
Dec 17 07:02:18 hcbbdb sshd\[7644\]: Invalid user tomcat from 5.135.101.228
Dec 17 07:02:18 hcbbdb sshd\[7644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=noxia.org
2019-12-17 15:07:18
185.139.189.206 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/185.139.189.206/ 
 
 NO - 1H : (2)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NO 
 NAME ASN : ASN206557 
 
 IP : 185.139.189.206 
 
 CIDR : 185.139.188.0/22 
 
 PREFIX COUNT : 6 
 
 UNIQUE IP COUNT : 30720 
 
 
 ATTACKS DETECTED ASN206557 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-12-17 07:30:14 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-12-17 14:57:43
117.69.47.176 attackspambots
SpamReport
2019-12-17 15:13:27
77.202.192.113 attackspam
SSH-bruteforce attempts
2019-12-17 15:03:50

Recently Reported IPs

106.163.120.51 153.203.245.68 166.130.151.241 152.67.124.98
24.52.62.19 24.55.83.34 87.244.109.107 65.195.185.100
182.65.204.1 123.116.50.208 109.201.72.29 58.153.179.46
85.114.222.6 205.246.201.250 73.132.144.4 111.94.123.190
96.93.56.72 75.247.94.131 137.140.11.144 186.53.185.100