Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Barcelona

Region: Catalonia

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.44.142.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63594
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.44.142.16.			IN	A

;; AUTHORITY SECTION:
.			458	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040102 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 09:39:26 CST 2020
;; MSG SIZE  rcvd: 116
Host info
16.142.44.81.in-addr.arpa domain name pointer 16.red-81-44-142.dynamicip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.142.44.81.in-addr.arpa	name = 16.red-81-44-142.dynamicip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.32.70 attackspambots
Aug 24 03:40:47 vtv3 sshd\[6739\]: Invalid user colorado from 106.13.32.70 port 33172
Aug 24 03:40:47 vtv3 sshd\[6739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.32.70
Aug 24 03:40:49 vtv3 sshd\[6739\]: Failed password for invalid user colorado from 106.13.32.70 port 33172 ssh2
Aug 24 03:42:53 vtv3 sshd\[7540\]: Invalid user publisher from 106.13.32.70 port 33162
Aug 24 03:42:53 vtv3 sshd\[7540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.32.70
Aug 24 03:54:06 vtv3 sshd\[13841\]: Invalid user geidy from 106.13.32.70 port 35712
Aug 24 03:54:06 vtv3 sshd\[13841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.32.70
Aug 24 03:54:08 vtv3 sshd\[13841\]: Failed password for invalid user geidy from 106.13.32.70 port 35712 ssh2
Aug 24 03:56:02 vtv3 sshd\[15022\]: Invalid user gnuhealth from 106.13.32.70 port 36058
Aug 24 03:56:02 vtv3 sshd\[15022\]: pam_u
2019-10-01 14:20:18
43.226.146.112 attackbotsspam
Oct  1 08:14:45 OPSO sshd\[24427\]: Invalid user teresa123 from 43.226.146.112 port 41030
Oct  1 08:14:45 OPSO sshd\[24427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.146.112
Oct  1 08:14:47 OPSO sshd\[24427\]: Failed password for invalid user teresa123 from 43.226.146.112 port 41030 ssh2
Oct  1 08:20:15 OPSO sshd\[25835\]: Invalid user demarini from 43.226.146.112 port 59300
Oct  1 08:20:15 OPSO sshd\[25835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.146.112
2019-10-01 14:25:00
150.116.19.36 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/150.116.19.36/ 
 CN - 1H : (447)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN18046 
 
 IP : 150.116.19.36 
 
 CIDR : 150.116.16.0/20 
 
 PREFIX COUNT : 46 
 
 UNIQUE IP COUNT : 69632 
 
 
 WYKRYTE ATAKI Z ASN18046 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-01 05:53:01 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 13:56:37
83.252.175.1 attackspam
Oct  1 01:15:33 xtremcommunity sshd\[54273\]: Invalid user dbps from 83.252.175.1 port 37156
Oct  1 01:15:33 xtremcommunity sshd\[54273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.252.175.1
Oct  1 01:15:35 xtremcommunity sshd\[54273\]: Failed password for invalid user dbps from 83.252.175.1 port 37156 ssh2
Oct  1 01:20:01 xtremcommunity sshd\[54913\]: Invalid user admin from 83.252.175.1 port 49344
Oct  1 01:20:01 xtremcommunity sshd\[54913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.252.175.1
...
2019-10-01 14:22:53
104.248.32.164 attackspam
Oct  1 09:06:18 server sshd\[22421\]: User root from 104.248.32.164 not allowed because listed in DenyUsers
Oct  1 09:06:18 server sshd\[22421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.32.164  user=root
Oct  1 09:06:20 server sshd\[22421\]: Failed password for invalid user root from 104.248.32.164 port 56174 ssh2
Oct  1 09:10:12 server sshd\[32689\]: Invalid user admin from 104.248.32.164 port 39882
Oct  1 09:10:12 server sshd\[32689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.32.164
2019-10-01 14:17:55
27.223.89.238 attack
Oct  1 06:53:26 vmanager6029 sshd\[14731\]: Invalid user nd from 27.223.89.238 port 56585
Oct  1 06:53:26 vmanager6029 sshd\[14731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.223.89.238
Oct  1 06:53:28 vmanager6029 sshd\[14731\]: Failed password for invalid user nd from 27.223.89.238 port 56585 ssh2
2019-10-01 13:45:51
51.68.230.54 attackspam
SSH bruteforce
2019-10-01 14:18:14
218.94.19.122 attackspam
Oct  1 07:06:14 intra sshd\[31684\]: Invalid user kuan123 from 218.94.19.122Oct  1 07:06:15 intra sshd\[31684\]: Failed password for invalid user kuan123 from 218.94.19.122 port 37318 ssh2Oct  1 07:10:36 intra sshd\[31765\]: Invalid user A@ditzu123 from 218.94.19.122Oct  1 07:10:38 intra sshd\[31765\]: Failed password for invalid user A@ditzu123 from 218.94.19.122 port 46538 ssh2Oct  1 07:15:01 intra sshd\[31875\]: Invalid user sandi from 218.94.19.122Oct  1 07:15:03 intra sshd\[31875\]: Failed password for invalid user sandi from 218.94.19.122 port 55754 ssh2
...
2019-10-01 13:56:51
36.236.35.122 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/36.236.35.122/ 
 TW - 1H : (226)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 36.236.35.122 
 
 CIDR : 36.236.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 23 
  3H - 53 
  6H - 66 
 12H - 96 
 24H - 158 
 
 DateTime : 2019-10-01 05:53:01 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 13:55:38
43.226.69.130 attackbots
Oct  1 03:58:58 vtv3 sshd\[31785\]: Invalid user tehnolog from 43.226.69.130 port 55076
Oct  1 03:58:58 vtv3 sshd\[31785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.130
Oct  1 03:59:00 vtv3 sshd\[31785\]: Failed password for invalid user tehnolog from 43.226.69.130 port 55076 ssh2
Oct  1 04:02:53 vtv3 sshd\[1411\]: Invalid user test2 from 43.226.69.130 port 60132
Oct  1 04:02:53 vtv3 sshd\[1411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.130
Oct  1 04:14:49 vtv3 sshd\[7284\]: Invalid user yx from 43.226.69.130 port 47052
Oct  1 04:14:49 vtv3 sshd\[7284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.130
Oct  1 04:14:51 vtv3 sshd\[7284\]: Failed password for invalid user yx from 43.226.69.130 port 47052 ssh2
Oct  1 04:18:52 vtv3 sshd\[9358\]: Invalid user alin from 43.226.69.130 port 52104
Oct  1 04:18:52 vtv3 sshd\[9358\]: pam_unix\(ssh
2019-10-01 14:07:43
213.183.101.89 attackbots
Sep 30 19:51:50 web9 sshd\[8800\]: Invalid user gmodserv from 213.183.101.89
Sep 30 19:51:50 web9 sshd\[8800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.183.101.89
Sep 30 19:51:52 web9 sshd\[8800\]: Failed password for invalid user gmodserv from 213.183.101.89 port 44020 ssh2
Sep 30 19:56:20 web9 sshd\[9790\]: Invalid user 09 from 213.183.101.89
Sep 30 19:56:20 web9 sshd\[9790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.183.101.89
2019-10-01 14:05:29
180.104.5.98 attackbots
Oct  1 06:53:04 elektron postfix/smtpd\[21969\]: NOQUEUE: reject: RCPT from unknown\[180.104.5.98\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[180.104.5.98\]\; from=\ to=\ proto=ESMTP helo=\
Oct  1 06:53:15 elektron postfix/smtpd\[25108\]: NOQUEUE: reject: RCPT from unknown\[180.104.5.98\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[180.104.5.98\]\; from=\ to=\ proto=ESMTP helo=\
Oct  1 06:53:56 elektron postfix/smtpd\[21969\]: NOQUEUE: reject: RCPT from unknown\[180.104.5.98\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[180.104.5.98\]\; from=\ to=\ proto=ESMTP helo=\
2019-10-01 13:50:26
36.189.253.228 attackbots
Oct  1 06:55:42 MK-Soft-VM7 sshd[11010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.253.228 
Oct  1 06:55:45 MK-Soft-VM7 sshd[11010]: Failed password for invalid user ubuntu from 36.189.253.228 port 34927 ssh2
...
2019-10-01 13:44:06
162.247.74.201 attackbotsspam
Automated report - ssh fail2ban:
Oct 1 05:53:03 authentication failure 
Oct 1 05:53:05 wrong password, user=admin, port=46170, ssh2
Oct 1 05:53:09 wrong password, user=admin, port=46170, ssh2
2019-10-01 13:48:23
159.89.134.64 attackspambots
Oct  1 01:58:45 ny01 sshd[19999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.64
Oct  1 01:58:47 ny01 sshd[19999]: Failed password for invalid user leroi from 159.89.134.64 port 54088 ssh2
Oct  1 02:02:58 ny01 sshd[20776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.64
2019-10-01 14:19:29

Recently Reported IPs

111.48.163.231 1.246.188.106 1.151.86.244 192.132.209.204
165.182.209.150 214.109.94.93 115.238.123.193 211.126.42.180
138.165.191.195 171.58.96.207 187.112.153.82 32.48.21.131
208.73.121.241 189.113.193.10 76.81.191.154 169.216.51.123
72.87.156.164 159.199.90.211 82.235.114.174 211.140.19.216