Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Las Rozas de Madrid

Region: Comunidad de Madrid

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.33.46.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47108
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.33.46.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121400 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 14 14:41:34 CST 2025
;; MSG SIZE  rcvd: 104
Host info
b'45.46.33.81.in-addr.arpa domain name pointer 45.red-81-33-46.dynamicip.rima-tde.net.
'
Nslookup info:
b'45.46.33.81.in-addr.arpa	name = 45.red-81-33-46.dynamicip.rima-tde.net.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
90.174.4.109 attackbotsspam
Website spammer attempting to set redirect url links to xxx-rated site
2019-07-02 02:47:34
36.110.211.2 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 02:41:13
37.49.231.105 attackbotsspam
Port scan on 1 port(s): 50802
2019-07-02 03:08:33
190.110.115.202 attackbots
23/tcp
[2019-07-01]1pkt
2019-07-02 03:15:28
198.167.223.52 attackspam
198.167.223.52 - - \[01/Jul/2019:17:36:20 +0200\] "GET /acadmin.php HTTP/1.1" 302 161 "-" "Mozilla/5.0 \(Windows NT 6.1\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/55.0.2883.87 Safari/537.36"
...
2019-07-02 02:41:57
159.203.80.144 attackbots
Automatic report - Web App Attack
2019-07-02 03:03:52
71.6.233.136 attackbots
Honeypot hit.
2019-07-02 02:40:39
206.189.94.158 attack
Jul  1 17:55:10 amit sshd\[9467\]: Invalid user support from 206.189.94.158
Jul  1 17:55:10 amit sshd\[9467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.94.158
Jul  1 17:55:12 amit sshd\[9467\]: Failed password for invalid user support from 206.189.94.158 port 35362 ssh2
...
2019-07-02 02:48:40
103.21.148.16 attackbots
Jul  1 20:04:50 ncomp sshd[14817]: Invalid user flume from 103.21.148.16
Jul  1 20:04:50 ncomp sshd[14817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.148.16
Jul  1 20:04:50 ncomp sshd[14817]: Invalid user flume from 103.21.148.16
Jul  1 20:04:51 ncomp sshd[14817]: Failed password for invalid user flume from 103.21.148.16 port 20621 ssh2
2019-07-02 02:52:21
185.220.101.70 attack
Automatic report - Web App Attack
2019-07-02 03:17:03
206.189.166.172 attack
Jul  1 17:43:43 *** sshd[25088]: Invalid user junior from 206.189.166.172
2019-07-02 02:49:23
168.181.196.28 attackbotsspam
Sending SPAM email
2019-07-02 02:36:55
37.211.60.221 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 02:55:40
39.108.97.62 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 03:05:26
104.236.72.187 attackspambots
Jul  1 09:34:09 plusreed sshd[6454]: Invalid user typo3 from 104.236.72.187
...
2019-07-02 02:58:44

Recently Reported IPs

154.239.228.194 59.237.13.84 18.243.92.53 134.29.200.5
23.73.221.112 58.163.161.17 233.116.200.55 144.197.84.118
238.252.3.119 86.144.246.131 70.98.251.249 129.18.198.71
42.16.149.75 233.77.39.109 226.11.70.34 123.125.229.174
139.71.101.113 33.97.89.74 30.65.179.166 149.15.23.5