Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.68.212.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.68.212.135.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 12:10:12 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 135.212.68.81.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.212.68.81.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.74.182.123 attackspambots
Excessive failed login attempts on port 587
2019-07-14 15:02:19
93.126.60.162 attackspambots
port scan/probe/communication attempt
2019-07-14 15:19:15
187.212.229.95 attack
Automatic report - Port Scan Attack
2019-07-14 15:19:39
106.12.28.36 attackspambots
Jul 14 06:27:15 OPSO sshd\[28493\]: Invalid user share from 106.12.28.36 port 43260
Jul 14 06:27:15 OPSO sshd\[28493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.36
Jul 14 06:27:16 OPSO sshd\[28493\]: Failed password for invalid user share from 106.12.28.36 port 43260 ssh2
Jul 14 06:30:18 OPSO sshd\[28971\]: Invalid user dh from 106.12.28.36 port 41634
Jul 14 06:30:18 OPSO sshd\[28971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.36
2019-07-14 15:00:11
104.248.122.33 attackbots
Jul 14 07:39:40 srv206 sshd[17247]: Invalid user brad from 104.248.122.33
...
2019-07-14 15:18:40
103.251.17.117 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-13 14:38:42,601 INFO [shellcode_manager] (103.251.17.117) no match, writing hexdump (08c43ecad27c8af8ec6b0d158a3f3a74 :2442079) - MS17010 (EternalBlue)
2019-07-14 14:52:56
138.99.163.0 attack
14.07.2019 02:31:55 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2019-07-14 15:16:36
140.143.4.188 attackspam
Jul 14 08:49:28 minden010 sshd[6368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.4.188
Jul 14 08:49:30 minden010 sshd[6368]: Failed password for invalid user testftp from 140.143.4.188 port 52964 ssh2
Jul 14 08:51:36 minden010 sshd[7096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.4.188
...
2019-07-14 15:20:55
14.241.236.119 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-13 14:38:52,909 INFO [shellcode_manager] (14.241.236.119) no match, writing hexdump (d30ba10f01281b0d1f9fb12fdf66f90d :13103) - SMB (Unknown)
2019-07-14 14:44:02
141.98.81.81 attackspambots
Triggered by Fail2Ban at Vostok web server
2019-07-14 14:58:24
167.86.103.153 attack
Jul 14 08:19:48 legacy sshd[19358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.103.153
Jul 14 08:19:49 legacy sshd[19358]: Failed password for invalid user pma from 167.86.103.153 port 59164 ssh2
Jul 14 08:24:56 legacy sshd[19500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.103.153
...
2019-07-14 14:36:03
128.199.142.0 attack
Jul 14 06:45:29 MK-Soft-VM6 sshd\[31698\]: Invalid user banana from 128.199.142.0 port 51422
Jul 14 06:45:29 MK-Soft-VM6 sshd\[31698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.0
Jul 14 06:45:30 MK-Soft-VM6 sshd\[31698\]: Failed password for invalid user banana from 128.199.142.0 port 51422 ssh2
...
2019-07-14 14:56:34
125.130.110.20 attackspambots
Jan 27 07:37:50 vtv3 sshd\[5480\]: Invalid user ftpuser from 125.130.110.20 port 60606
Jan 27 07:37:50 vtv3 sshd\[5480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20
Jan 27 07:37:52 vtv3 sshd\[5480\]: Failed password for invalid user ftpuser from 125.130.110.20 port 60606 ssh2
Jan 27 07:43:01 vtv3 sshd\[6919\]: Invalid user ghost from 125.130.110.20 port 36430
Jan 27 07:43:01 vtv3 sshd\[6919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20
Feb 15 22:21:13 vtv3 sshd\[30811\]: Invalid user ts3bot3 from 125.130.110.20 port 41200
Feb 15 22:21:13 vtv3 sshd\[30811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20
Feb 15 22:21:15 vtv3 sshd\[30811\]: Failed password for invalid user ts3bot3 from 125.130.110.20 port 41200 ssh2
Feb 15 22:26:59 vtv3 sshd\[32300\]: Invalid user srashid from 125.130.110.20 port 59454
Feb 15 22:26:59 vtv3 sshd\[
2019-07-14 15:15:04
190.145.55.89 attack
Jul 14 08:14:57 legacy sshd[19190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.55.89
Jul 14 08:14:59 legacy sshd[19190]: Failed password for invalid user web from 190.145.55.89 port 52150 ssh2
Jul 14 08:20:42 legacy sshd[19386]: Failed password for root from 190.145.55.89 port 52942 ssh2
...
2019-07-14 14:36:31
80.245.118.42 attackspambots
[portscan] Port scan
2019-07-14 15:26:46

Recently Reported IPs

181.93.214.161 203.159.80.249 52.158.166.95 219.233.229.226
79.134.4.65 180.188.251.99 142.251.40.197 5.161.44.99
87.188.230.193 103.121.89.72 103.27.0.31 62.16.37.204
91.109.159.199 185.136.193.102 81.215.231.213 156.200.132.119
220.198.222.84 117.147.81.113 27.45.34.111 221.209.32.50