Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Belgium

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.240.45.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.240.45.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 10:20:04 CST 2025
;; MSG SIZE  rcvd: 105
Host info
52.45.240.81.in-addr.arpa domain name pointer 52.45-240-81.adsl-dyn.isp.belgacom.be.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.45.240.81.in-addr.arpa	name = 52.45-240-81.adsl-dyn.isp.belgacom.be.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.131 attackspambots
SSH Brute Force, server-1 sshd[19936]: Failed password for root from 218.92.0.131 port 35175 ssh2
2019-12-20 16:39:08
40.92.70.60 attackbots
Dec 20 09:28:59 debian-2gb-vpn-nbg1-1 kernel: [1201699.585423] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.70.60 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=110 ID=28482 DF PROTO=TCP SPT=46790 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-20 16:15:51
168.90.89.35 attackbots
Dec 19 22:07:14 eddieflores sshd\[27429\]: Invalid user lehre from 168.90.89.35
Dec 19 22:07:14 eddieflores sshd\[27429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.89.35.megalinkpi.net.br
Dec 19 22:07:16 eddieflores sshd\[27429\]: Failed password for invalid user lehre from 168.90.89.35 port 50260 ssh2
Dec 19 22:14:30 eddieflores sshd\[28134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.89.35.megalinkpi.net.br  user=root
Dec 19 22:14:32 eddieflores sshd\[28134\]: Failed password for root from 168.90.89.35 port 53482 ssh2
2019-12-20 16:17:01
86.61.66.59 attackbots
Dec 20 08:58:36 localhost sshd[15645]: Failed password for invalid user mysql from 86.61.66.59 port 59031 ssh2
Dec 20 09:11:01 localhost sshd[16039]: Failed password for root from 86.61.66.59 port 48832 ssh2
Dec 20 09:17:47 localhost sshd[16259]: User www-data from 86.61.66.59 not allowed because not listed in AllowUsers
2019-12-20 16:20:10
51.255.162.65 attack
Dec 19 22:02:18 wbs sshd\[2321\]: Invalid user qwertyuiop from 51.255.162.65
Dec 19 22:02:18 wbs sshd\[2321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.ip-51-255-162.eu
Dec 19 22:02:20 wbs sshd\[2321\]: Failed password for invalid user qwertyuiop from 51.255.162.65 port 57508 ssh2
Dec 19 22:07:17 wbs sshd\[3037\]: Invalid user verkland from 51.255.162.65
Dec 19 22:07:17 wbs sshd\[3037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.ip-51-255-162.eu
2019-12-20 16:08:43
83.226.39.188 attackbots
Unauthorized connection attempt detected from IP address 83.226.39.188 to port 5555
2019-12-20 16:15:34
173.213.88.78 attack
Childish Website Spammer IDIOT~
2019-12-20 16:37:25
104.248.37.88 attack
Unauthorized connection attempt detected from IP address 104.248.37.88 to port 2226
2019-12-20 16:31:56
218.76.52.29 attackbotsspam
Dec 19 22:21:16 web1 sshd\[16213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.76.52.29  user=root
Dec 19 22:21:18 web1 sshd\[16213\]: Failed password for root from 218.76.52.29 port 52550 ssh2
Dec 19 22:25:49 web1 sshd\[16667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.76.52.29  user=root
Dec 19 22:25:52 web1 sshd\[16667\]: Failed password for root from 218.76.52.29 port 34378 ssh2
Dec 19 22:30:12 web1 sshd\[17120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.76.52.29  user=root
2019-12-20 16:36:24
145.239.198.218 attackbotsspam
Dec 20 09:11:29 vps58358 sshd\[10690\]: Invalid user tantinews from 145.239.198.218Dec 20 09:11:30 vps58358 sshd\[10690\]: Failed password for invalid user tantinews from 145.239.198.218 port 41298 ssh2Dec 20 09:16:07 vps58358 sshd\[10724\]: Invalid user holaday from 145.239.198.218Dec 20 09:16:09 vps58358 sshd\[10724\]: Failed password for invalid user holaday from 145.239.198.218 port 59254 ssh2Dec 20 09:20:53 vps58358 sshd\[10754\]: Invalid user wwwrun from 145.239.198.218Dec 20 09:20:54 vps58358 sshd\[10754\]: Failed password for invalid user wwwrun from 145.239.198.218 port 48544 ssh2
...
2019-12-20 16:22:28
35.210.157.201 attack
$f2bV_matches
2019-12-20 16:14:17
111.67.205.212 attackbots
Dec 20 09:26:32 eventyay sshd[13833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.205.212
Dec 20 09:26:35 eventyay sshd[13833]: Failed password for invalid user atmaja@123 from 111.67.205.212 port 49676 ssh2
Dec 20 09:32:30 eventyay sshd[13953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.205.212
...
2019-12-20 16:41:16
218.92.0.175 attackspam
Dec 20 09:18:05 serwer sshd\[29901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Dec 20 09:18:07 serwer sshd\[29901\]: Failed password for root from 218.92.0.175 port 5257 ssh2
Dec 20 09:18:10 serwer sshd\[29901\]: Failed password for root from 218.92.0.175 port 5257 ssh2
...
2019-12-20 16:23:24
88.132.237.187 attackspam
web-1 [ssh_2] SSH Attack
2019-12-20 16:06:32
81.22.45.253 attackbotsspam
12/20/2019-08:54:26.365176 81.22.45.253 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-20 16:07:04

Recently Reported IPs

157.224.10.33 73.178.95.72 66.199.245.208 234.111.108.74
155.46.5.207 252.216.112.105 51.172.200.161 96.181.135.17
164.36.22.38 201.45.165.195 178.135.215.94 124.2.128.137
83.45.38.129 162.80.185.45 157.114.11.17 141.191.200.109
199.217.139.230 251.233.168.216 60.212.67.126 25.229.55.42