Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Middlesbrough

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.99.44.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25914
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.99.44.19.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052801 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 29 06:17:55 CST 2022
;; MSG SIZE  rcvd: 104
Host info
19.44.99.81.in-addr.arpa domain name pointer cpc103684-stkn16-2-0-cust18.11-2.cable.virginm.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.44.99.81.in-addr.arpa	name = cpc103684-stkn16-2-0-cust18.11-2.cable.virginm.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.89.230.141 attack
Sep 25 05:51:53 markkoudstaal sshd[22845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.230.141
Sep 25 05:51:55 markkoudstaal sshd[22845]: Failed password for invalid user alberto from 159.89.230.141 port 37654 ssh2
Sep 25 05:56:29 markkoudstaal sshd[23228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.230.141
2019-09-25 12:05:44
186.50.32.74 attackbots
Port Scan: TCP/60001
2019-09-25 09:41:36
217.61.14.223 attack
Sep 25 05:52:24 SilenceServices sshd[3108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.14.223
Sep 25 05:52:26 SilenceServices sshd[3108]: Failed password for invalid user sanjeev from 217.61.14.223 port 43534 ssh2
Sep 25 05:56:32 SilenceServices sshd[4195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.14.223
2019-09-25 12:01:48
112.64.32.118 attackbotsspam
Sep 25 06:49:04 site1 sshd\[12514\]: Invalid user jwy from 112.64.32.118Sep 25 06:49:06 site1 sshd\[12514\]: Failed password for invalid user jwy from 112.64.32.118 port 37562 ssh2Sep 25 06:52:41 site1 sshd\[12790\]: Invalid user admin from 112.64.32.118Sep 25 06:52:43 site1 sshd\[12790\]: Failed password for invalid user admin from 112.64.32.118 port 38058 ssh2Sep 25 06:56:23 site1 sshd\[13056\]: Invalid user website from 112.64.32.118Sep 25 06:56:25 site1 sshd\[13056\]: Failed password for invalid user website from 112.64.32.118 port 38550 ssh2
...
2019-09-25 12:06:33
79.155.35.226 attackbots
Sep 25 02:16:06 lvps87-230-18-107 sshd[21997]: Invalid user univershostnameaetsrechenzentrum from 79.155.35.226
Sep 25 02:16:08 lvps87-230-18-107 sshd[21997]: Failed password for invalid user univershostnameaetsrechenzentrum from 79.155.35.226 port 36876 ssh2
Sep 25 02:16:08 lvps87-230-18-107 sshd[21997]: Received disconnect from 79.155.35.226: 11: Bye Bye [preauth]
Sep 25 02:19:42 lvps87-230-18-107 sshd[22067]: Invalid user ogrish123 from 79.155.35.226
Sep 25 02:19:44 lvps87-230-18-107 sshd[22067]: Failed password for invalid user ogrish123 from 79.155.35.226 port 50138 ssh2
Sep 25 02:19:44 lvps87-230-18-107 sshd[22067]: Received disconnect from 79.155.35.226: 11: Bye Bye [preauth]
Sep 25 02:23:15 lvps87-230-18-107 sshd[22201]: Invalid user omega from 79.155.35.226
Sep 25 02:23:17 lvps87-230-18-107 sshd[22201]: Failed password for invalid user omega from 79.155.35.226 port 35166 ssh2
Sep 25 02:23:17 lvps87-230-18-107 sshd[22201]: Received disconnect from 79.155.35.226:........
-------------------------------
2019-09-25 12:16:09
35.236.77.105 attack
Port Scan: TCP/80
2019-09-25 09:51:35
208.187.166.187 attackbots
Spam mails sent to address hacked/leaked from Nexus Mods in July 2013
2019-09-25 12:22:04
24.227.164.55 attackspambots
Port Scan: UDP/137
2019-09-25 09:51:56
87.251.99.153 attackspambots
Port Scan: TCP/5984
2019-09-25 09:36:19
122.14.219.4 attackspam
Sep 24 18:43:30 aat-srv002 sshd[28976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.219.4
Sep 24 18:43:32 aat-srv002 sshd[28976]: Failed password for invalid user albus from 122.14.219.4 port 42796 ssh2
Sep 24 18:48:00 aat-srv002 sshd[29102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.219.4
Sep 24 18:48:02 aat-srv002 sshd[29102]: Failed password for invalid user vega from 122.14.219.4 port 49794 ssh2
...
2019-09-25 09:44:25
222.186.175.216 attackspambots
Sep 25 06:09:36 [host] sshd[18582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Sep 25 06:09:37 [host] sshd[18582]: Failed password for root from 222.186.175.216 port 14028 ssh2
Sep 25 06:09:49 [host] sshd[18582]: Failed password for root from 222.186.175.216 port 14028 ssh2
2019-09-25 12:13:21
188.16.145.117 attackbots
port 23 attempt blocked
2019-09-25 09:41:10
196.52.43.59 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-25 12:08:23
68.70.221.23 attackspam
Unauthorised access (Sep 25) SRC=68.70.221.23 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=65266 TCP DPT=23 WINDOW=46116 SYN 
Unauthorised access (Sep 24) SRC=68.70.221.23 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=52743 TCP DPT=8080 WINDOW=52316 SYN 
Unauthorised access (Sep 24) SRC=68.70.221.23 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=9737 TCP DPT=8080 WINDOW=8669 SYN
2019-09-25 12:20:16
80.82.64.127 attackspam
Port Scan: TCP/3394
2019-09-25 09:37:51

Recently Reported IPs

88.224.175.253 231.223.44.137 69.217.114.82 197.17.194.179
86.228.212.91 8.246.177.0 184.162.163.31 16.155.243.65
100.124.216.215 182.194.111.155 224.23.61.117 177.102.0.204
211.103.187.178 136.247.197.166 140.36.104.59 112.133.225.115
174.120.118.8 247.150.92.184 76.129.31.165 86.216.119.37