Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Madrid

Region: Madrid

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: Telefonica De Espana

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.45.72.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22829
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.45.72.92.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019043000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 01 01:45:22 +08 2019
;; MSG SIZE  rcvd: 115

Host info
92.72.45.81.in-addr.arpa domain name pointer 92.red-81-45-72.staticip.rima-tde.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
92.72.45.81.in-addr.arpa	name = 92.red-81-45-72.staticip.rima-tde.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
193.34.55.64 attack
34,11-03/03 concatform PostRequest-Spammer scoring: wien2018
2019-09-06 18:06:41
223.247.194.119 attack
Brute force attempt
2019-09-06 18:24:21
51.68.136.36 attackbotsspam
Sep  5 23:22:58 php2 sshd\[20978\]: Invalid user 12345 from 51.68.136.36
Sep  5 23:22:58 php2 sshd\[20978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-68-136.eu
Sep  5 23:23:00 php2 sshd\[20978\]: Failed password for invalid user 12345 from 51.68.136.36 port 60298 ssh2
Sep  5 23:28:06 php2 sshd\[21386\]: Invalid user teamspeakpass from 51.68.136.36
Sep  5 23:28:06 php2 sshd\[21386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-68-136.eu
2019-09-06 17:34:12
218.98.40.149 attack
Sep  6 04:40:30 aat-srv002 sshd[8631]: Failed password for root from 218.98.40.149 port 41480 ssh2
Sep  6 04:40:38 aat-srv002 sshd[8642]: Failed password for root from 218.98.40.149 port 62272 ssh2
Sep  6 04:40:47 aat-srv002 sshd[8647]: Failed password for root from 218.98.40.149 port 21491 ssh2
...
2019-09-06 17:44:36
47.91.90.132 attackbotsspam
Sep  6 10:06:41 pornomens sshd\[22133\]: Invalid user mysql from 47.91.90.132 port 36412
Sep  6 10:06:41 pornomens sshd\[22133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.91.90.132
Sep  6 10:06:43 pornomens sshd\[22133\]: Failed password for invalid user mysql from 47.91.90.132 port 36412 ssh2
...
2019-09-06 17:43:14
206.189.128.7 attackbotsspam
Sep  6 06:41:52 pkdns2 sshd\[21616\]: Invalid user testuser from 206.189.128.7Sep  6 06:41:54 pkdns2 sshd\[21616\]: Failed password for invalid user testuser from 206.189.128.7 port 32838 ssh2Sep  6 06:46:43 pkdns2 sshd\[21816\]: Invalid user ansible from 206.189.128.7Sep  6 06:46:45 pkdns2 sshd\[21816\]: Failed password for invalid user ansible from 206.189.128.7 port 47884 ssh2Sep  6 06:51:47 pkdns2 sshd\[22003\]: Invalid user deploy from 206.189.128.7Sep  6 06:51:48 pkdns2 sshd\[22003\]: Failed password for invalid user deploy from 206.189.128.7 port 34698 ssh2
...
2019-09-06 18:02:37
92.255.178.230 attackspambots
Sep  5 23:35:34 hpm sshd\[13176\]: Invalid user musicbot from 92.255.178.230
Sep  5 23:35:34 hpm sshd\[13176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.178.230
Sep  5 23:35:36 hpm sshd\[13176\]: Failed password for invalid user musicbot from 92.255.178.230 port 52570 ssh2
Sep  5 23:40:22 hpm sshd\[13668\]: Invalid user admin from 92.255.178.230
Sep  5 23:40:22 hpm sshd\[13668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.178.230
2019-09-06 17:46:30
51.89.173.198 attackbotsspam
09/06/2019-03:51:42.428848 51.89.173.198 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 51
2019-09-06 17:38:08
91.67.77.26 attackspambots
Jul 25 22:47:18 Server10 sshd[2054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.67.77.26
Jul 25 22:47:20 Server10 sshd[2054]: Failed password for invalid user oracle from 91.67.77.26 port 42168 ssh2
Aug  6 19:24:10 Server10 sshd[32716]: Invalid user prueba from 91.67.77.26 port 34470
Aug  6 19:24:10 Server10 sshd[32716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.67.77.26
Aug  6 19:24:12 Server10 sshd[32716]: Failed password for invalid user prueba from 91.67.77.26 port 34470 ssh2
2019-09-06 17:40:34
61.228.163.200 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-06 02:41:02,140 INFO [amun_request_handler] PortScan Detected on Port: 445 (61.228.163.200)
2019-09-06 17:48:45
141.98.9.130 attack
Sep  6 11:24:11 relay postfix/smtpd\[689\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  6 11:24:36 relay postfix/smtpd\[28653\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  6 11:24:54 relay postfix/smtpd\[691\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  6 11:25:20 relay postfix/smtpd\[8473\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  6 11:25:38 relay postfix/smtpd\[2101\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-06 17:27:26
198.211.102.9 attackbotsspam
Sep  6 11:22:14 vps647732 sshd[10184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.102.9
Sep  6 11:22:16 vps647732 sshd[10184]: Failed password for invalid user student3 from 198.211.102.9 port 43057 ssh2
...
2019-09-06 17:22:55
107.170.249.6 attack
Sep  6 11:42:15 rpi sshd[9020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.249.6 
Sep  6 11:42:17 rpi sshd[9020]: Failed password for invalid user webmaster from 107.170.249.6 port 42117 ssh2
2019-09-06 18:13:33
139.199.192.159 attackspambots
Sep  6 08:44:24 lnxded64 sshd[5221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.192.159
2019-09-06 18:07:02
202.223.120.220 attackspam
port scan and connect, tcp 23 (telnet)
2019-09-06 18:28:51

Recently Reported IPs

50.252.75.101 149.152.170.204 197.50.226.218 190.82.107.162
102.170.122.121 119.42.123.105 151.42.79.52 189.9.0.134
197.45.169.151 193.117.236.108 143.198.133.71 101.31.169.253
139.200.35.102 79.156.247.48 42.198.151.61 94.49.249.122
150.71.7.38 151.254.49.41 86.201.221.165 176.41.75.75