Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guangzhou

Region: Guangdong

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '81.68.0.0 - 81.71.255.255'

% No abuse contact registered for 81.68.0.0 - 81.71.255.255

inetnum:        81.68.0.0 - 81.71.255.255
netname:        NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
descr:          IPv4 address block not managed by the RIPE NCC
remarks:        ------------------------------------------------------
remarks:
remarks:        For registration information,
remarks:        you can consult the following sources:
remarks:
remarks:        IANA
remarks:        http://www.iana.org/assignments/ipv4-address-space
remarks:        http://www.iana.org/assignments/iana-ipv4-special-registry
remarks:        http://www.iana.org/assignments/ipv4-recovered-address-space
remarks:
remarks:        AFRINIC (Africa)
remarks:        http://www.afrinic.net/ whois.afrinic.net
remarks:
remarks:        APNIC (Asia Pacific)
remarks:        http://www.apnic.net/ whois.apnic.net
remarks:
remarks:        ARIN (Northern America)
remarks:        http://www.arin.net/ whois.arin.net
remarks:
remarks:        LACNIC (Latin America and the Carribean)
remarks:        http://www.lacnic.net/ whois.lacnic.net
remarks:
remarks:        ------------------------------------------------------
country:        EU # Country is really world wide
admin-c:        IANA1-RIPE
tech-c:         IANA1-RIPE
status:         ALLOCATED UNSPECIFIED
mnt-by:         RIPE-NCC-HM-MNT
created:        2019-01-07T10:47:18Z
last-modified:  2019-01-07T10:47:18Z
source:         RIPE

role:           Internet Assigned Numbers Authority
address:        see http://www.iana.org.
admin-c:        IANA1-RIPE
tech-c:         IANA1-RIPE
nic-hdl:        IANA1-RIPE
remarks:        For more information on IANA services
remarks:        go to IANA web site at http://www.iana.org.
mnt-by:         RIPE-NCC-MNT
created:        1970-01-01T00:00:00Z
last-modified:  2001-09-22T09:31:27Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.71.34.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.71.34.249.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042202 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 05:00:05 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 249.34.71.81.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.34.71.81.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
88.86.103.175 attackbotsspam
SSH login attempts.
2020-07-10 02:53:19
103.14.210.43 attack
Postfix RBL failed
2020-07-10 02:33:52
216.70.64.121 attackspam
SSH login attempts.
2020-07-10 02:52:02
150.109.52.213 attack
SSH login attempts.
2020-07-10 02:52:49
192.185.21.109 attackspam
SSH login attempts.
2020-07-10 02:57:47
153.122.52.35 attackspam
SSH login attempts.
2020-07-10 02:49:12
31.28.24.112 attackspam
SSH login attempts.
2020-07-10 02:28:12
81.201.125.167 attack
detected by Fail2Ban
2020-07-10 02:39:28
184.106.184.126 attackbots
SSH login attempts.
2020-07-10 02:24:51
222.82.214.218 attack
...
2020-07-10 02:24:15
47.104.128.186 attack
SSH Brute-Force reported by Fail2Ban
2020-07-10 02:23:43
88.151.101.215 attackbots
SSH login attempts.
2020-07-10 02:32:22
191.34.162.186 attack
Jul  9 17:20:52 ip-172-31-62-245 sshd\[25132\]: Invalid user Artur from 191.34.162.186\
Jul  9 17:20:54 ip-172-31-62-245 sshd\[25132\]: Failed password for invalid user Artur from 191.34.162.186 port 42661 ssh2\
Jul  9 17:24:30 ip-172-31-62-245 sshd\[25175\]: Invalid user rjf from 191.34.162.186\
Jul  9 17:24:32 ip-172-31-62-245 sshd\[25175\]: Failed password for invalid user rjf from 191.34.162.186 port 45564 ssh2\
Jul  9 17:28:02 ip-172-31-62-245 sshd\[25219\]: Invalid user test from 191.34.162.186\
2020-07-10 02:30:21
37.146.79.179 attack
Unauthorized connection attempt from IP address 37.146.79.179 on Port 3389(RDP)
2020-07-10 02:43:28
106.12.47.108 attackspam
SSH Brute-Force reported by Fail2Ban
2020-07-10 02:53:03

Recently Reported IPs

138.68.246.32 160.119.76.24 67.210.97.34 54.147.211.146
110.77.187.94 2606:4700:10::6814:9880 2606:4700:10::6816:357 2606:4700:10::ac43:599
2606:4700:10::6814:6021 120.55.64.150 39.71.178.12 211.90.113.244
183.252.162.93 1.30.27.138 124.89.62.14 123.163.229.19
123.155.165.154 123.13.13.73 121.10.180.21 120.239.31.153