Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.42.161.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.42.161.218.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011201 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 13 04:08:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
218.161.42.81.in-addr.arpa domain name pointer 218.red-81-42-161.staticip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
218.161.42.81.in-addr.arpa	name = 218.red-81-42-161.staticip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.65.133.212 attackspam
Nov 22 06:25:52 eventyay sshd[6252]: Failed password for root from 159.65.133.212 port 60890 ssh2
Nov 22 06:30:07 eventyay sshd[6311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.133.212
Nov 22 06:30:10 eventyay sshd[6311]: Failed password for invalid user dang from 159.65.133.212 port 60640 ssh2
...
2019-11-22 13:42:31
45.141.84.18 attackbotsspam
Nov 22 06:14:59 srv01 postfix/smtpd\[1707\]: warning: unknown\[45.141.84.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 22 06:16:37 srv01 postfix/smtpd\[1707\]: warning: unknown\[45.141.84.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 22 06:17:46 srv01 postfix/smtpd\[1707\]: warning: unknown\[45.141.84.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 22 06:20:35 srv01 postfix/smtpd\[1707\]: warning: unknown\[45.141.84.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 22 06:21:00 srv01 postfix/smtpd\[1707\]: warning: unknown\[45.141.84.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-22 13:25:58
123.14.88.84 attackspambots
Fail2Ban - FTP Abuse Attempt
2019-11-22 13:46:43
78.128.112.114 attackbotsspam
Port scan: Attack repeated for 24 hours
2019-11-22 13:19:07
104.206.128.38 attack
" "
2019-11-22 13:48:39
109.196.82.214 attackbotsspam
spam FO
2019-11-22 13:35:55
125.130.110.20 attackspambots
Nov 22 05:51:46 sso sshd[18224]: Failed password for root from 125.130.110.20 port 57148 ssh2
...
2019-11-22 13:55:15
217.145.45.2 attackspambots
2019-11-22T05:52:47.435605  sshd[31282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.145.45.2  user=root
2019-11-22T05:52:49.448759  sshd[31282]: Failed password for root from 217.145.45.2 port 37519 ssh2
2019-11-22T05:56:34.467828  sshd[31315]: Invalid user neuman from 217.145.45.2 port 55444
2019-11-22T05:56:34.481123  sshd[31315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.145.45.2
2019-11-22T05:56:34.467828  sshd[31315]: Invalid user neuman from 217.145.45.2 port 55444
2019-11-22T05:56:36.323675  sshd[31315]: Failed password for invalid user neuman from 217.145.45.2 port 55444 ssh2
...
2019-11-22 13:29:14
106.51.37.107 attack
SSH Brute Force
2019-11-22 13:39:23
212.237.53.169 attackbots
Nov 22 05:48:32 hcbbdb sshd\[30002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.53.169  user=daemon
Nov 22 05:48:34 hcbbdb sshd\[30002\]: Failed password for daemon from 212.237.53.169 port 57940 ssh2
Nov 22 05:52:13 hcbbdb sshd\[30372\]: Invalid user wwwrun from 212.237.53.169
Nov 22 05:52:13 hcbbdb sshd\[30372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.53.169
Nov 22 05:52:16 hcbbdb sshd\[30372\]: Failed password for invalid user wwwrun from 212.237.53.169 port 37248 ssh2
2019-11-22 13:54:03
109.181.68.114 attackspam
Nov 22 07:55:48 server sshd\[9481\]: Invalid user pi from 109.181.68.114
Nov 22 07:55:48 server sshd\[9481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.181.68.114 
Nov 22 07:55:48 server sshd\[9483\]: Invalid user pi from 109.181.68.114
Nov 22 07:55:48 server sshd\[9483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.181.68.114 
Nov 22 07:55:50 server sshd\[9481\]: Failed password for invalid user pi from 109.181.68.114 port 43424 ssh2
...
2019-11-22 13:55:52
222.127.101.155 attackbotsspam
Nov 21 19:10:52 hpm sshd\[13190\]: Invalid user ple from 222.127.101.155
Nov 21 19:10:52 hpm sshd\[13190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.101.155
Nov 21 19:10:54 hpm sshd\[13190\]: Failed password for invalid user ple from 222.127.101.155 port 25046 ssh2
Nov 21 19:15:40 hpm sshd\[13565\]: Invalid user cj from 222.127.101.155
Nov 21 19:15:40 hpm sshd\[13565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.101.155
2019-11-22 13:47:00
134.209.190.139 attackbots
fail2ban honeypot
2019-11-22 13:22:14
172.96.84.78 attackspambots
Automatic report - Banned IP Access
2019-11-22 13:38:51
35.201.243.170 attackbotsspam
Nov 22 10:39:21 vibhu-HP-Z238-Microtower-Workstation sshd\[31019\]: Invalid user helena from 35.201.243.170
Nov 22 10:39:21 vibhu-HP-Z238-Microtower-Workstation sshd\[31019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.201.243.170
Nov 22 10:39:23 vibhu-HP-Z238-Microtower-Workstation sshd\[31019\]: Failed password for invalid user helena from 35.201.243.170 port 62978 ssh2
Nov 22 10:43:39 vibhu-HP-Z238-Microtower-Workstation sshd\[31203\]: Invalid user f4m1ly from 35.201.243.170
Nov 22 10:43:39 vibhu-HP-Z238-Microtower-Workstation sshd\[31203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.201.243.170
...
2019-11-22 13:26:32

Recently Reported IPs

43.140.97.67 139.159.213.41 82.15.126.6 134.252.194.237
123.159.67.22 162.247.107.106 203.34.42.138 151.55.136.172
147.81.74.163 33.112.134.112 237.117.64.143 139.113.196.183
246.60.121.22 117.147.197.85 175.61.140.136 115.5.233.88
186.135.17.78 167.142.174.27 236.198.126.195 74.48.19.48