Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zaragoza

Region: Aragon

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.36.49.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51399
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.36.49.55.			IN	A

;; AUTHORITY SECTION:
.			445	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060100 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 02 00:21:15 CST 2020
;; MSG SIZE  rcvd: 115
Host info
55.49.36.81.in-addr.arpa domain name pointer 55.red-81-36-49.dynamicip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.49.36.81.in-addr.arpa	name = 55.red-81-36-49.dynamicip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.42.27.187 attack
2019-10-30 13:06:20,337 fail2ban.actions        \[1897\]: NOTICE  \[ssh\] Ban 104.42.27.187
2019-10-30 13:27:54,342 fail2ban.actions        \[1897\]: NOTICE  \[ssh\] Ban 104.42.27.187
2019-10-30 13:45:44,284 fail2ban.actions        \[1897\]: NOTICE  \[ssh\] Ban 104.42.27.187
2019-10-30 14:03:37,791 fail2ban.actions        \[1897\]: NOTICE  \[ssh\] Ban 104.42.27.187
2019-10-30 14:21:16,437 fail2ban.actions        \[1897\]: NOTICE  \[ssh\] Ban 104.42.27.187
2019-10-30 13:06:20,337 fail2ban.actions        \[1897\]: NOTICE  \[ssh\] Ban 104.42.27.187
2019-10-30 13:27:54,342 fail2ban.actions        \[1897\]: NOTICE  \[ssh\] Ban 104.42.27.187
2019-10-30 13:45:44,284 fail2ban.actions        \[1897\]: NOTICE  \[ssh\] Ban 104.42.27.187
2019-10-30 14:03:37,791 fail2ban.actions        \[1897\]: NOTICE  \[ssh\] Ban 104.42.27.187
2019-10-30 14:21:16,437 fail2ban.actions        \[1897\]: NOTICE  \[ssh\] Ban 104.42.27.187
2019-10-30 13:06:20,337 fail2ban.actions        \[1897\]: NOTICE  \[ssh\] Ban 104.42.27.187
2019-10-30 1
2019-11-01 04:13:14
45.82.153.132 attackbotsspam
2019-10-31T20:41:53.219986mail01 postfix/smtpd[25788]: warning: unknown[45.82.153.132]: SASL PLAIN authentication failed:
2019-10-31T20:42:00.153960mail01 postfix/smtpd[30859]: warning: unknown[45.82.153.132]: SASL PLAIN authentication failed:
2019-10-31T20:44:19.187542mail01 postfix/smtpd[30697]: warning: unknown[45.82.153.132]: SASL PLAIN authentication failed:
2019-11-01 03:57:48
42.118.213.201 attackbotsspam
Unauthorized connection attempt from IP address 42.118.213.201 on Port 445(SMB)
2019-11-01 04:27:59
128.199.224.215 attack
Oct 31 06:15:56 eddieflores sshd\[17834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.224.215  user=root
Oct 31 06:15:59 eddieflores sshd\[17834\]: Failed password for root from 128.199.224.215 port 35714 ssh2
Oct 31 06:20:02 eddieflores sshd\[18162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.224.215  user=root
Oct 31 06:20:04 eddieflores sshd\[18162\]: Failed password for root from 128.199.224.215 port 44474 ssh2
Oct 31 06:24:11 eddieflores sshd\[19037\]: Invalid user temp from 128.199.224.215
2019-11-01 03:58:49
106.203.48.234 attackspam
Unauthorised access (Oct 31) SRC=106.203.48.234 LEN=52 TOS=0x08 TTL=117 ID=21457 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-01 03:53:54
139.99.115.27 attackspam
/wp-login.php
2019-11-01 04:01:21
138.68.93.14 attackspambots
Oct 31 21:12:19 sso sshd[2250]: Failed password for root from 138.68.93.14 port 46238 ssh2
...
2019-11-01 04:26:35
45.82.153.76 attack
2019-10-31T21:15:10.285975mail01 postfix/smtpd[25758]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-31T21:15:33.318720mail01 postfix/smtpd[5429]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-31T21:15:54.019999mail01 postfix/smtpd[5429]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-01 04:27:25
104.151.85.10 attack
Registration form abuse
2019-11-01 04:21:58
109.93.31.242 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/109.93.31.242/ 
 
 RS - 1H : (3)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RS 
 NAME ASN : ASN8400 
 
 IP : 109.93.31.242 
 
 CIDR : 109.92.0.0/15 
 
 PREFIX COUNT : 79 
 
 UNIQUE IP COUNT : 711680 
 
 
 ATTACKS DETECTED ASN8400 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 3 
 24H - 3 
 
 DateTime : 2019-10-31 21:15:56 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-01 04:24:00
107.180.121.50 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-01 04:04:09
217.21.193.20 attackbotsspam
Automatic report - Banned IP Access
2019-11-01 03:58:09
212.64.109.31 attackbotsspam
2019-10-31T20:15:53.939251abusebot-4.cloudsearch.cf sshd\[6373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.109.31  user=root
2019-11-01 04:27:44
36.68.7.132 attackbotsspam
Unauthorized connection attempt from IP address 36.68.7.132 on Port 445(SMB)
2019-11-01 04:24:39
111.10.43.244 attackspambots
SSH invalid-user multiple login attempts
2019-11-01 04:11:33

Recently Reported IPs

134.159.15.205 187.44.132.109 207.97.176.206 105.176.159.98
126.114.177.96 208.91.77.228 34.112.37.106 70.31.88.70
188.51.22.100 80.132.101.205 77.169.46.50 195.67.255.208
121.186.90.153 193.152.120.161 155.15.182.197 44.135.47.141
183.56.74.127 32.194.70.50 27.65.178.67 36.236.76.150