Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Nigeria

Internet Service Provider: MTN Nigeria Communication Limited

Hostname: unknown

Organization: unknown

Usage Type: Mobile ISP

Comments:
Type Details Datetime
attackspam
1591388890 - 06/05/2020 22:28:10 Host: 102.89.2.40/102.89.2.40 Port: 445 TCP Blocked
2020-06-06 05:16:05
Comments on same subnet:
IP Type Details Datetime
102.89.2.28 attackbots
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=56637  .  dstport=445  .     (3133)
2020-09-28 05:26:31
102.89.2.28 attack
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=56637  .  dstport=445  .     (3133)
2020-09-27 21:45:27
102.89.2.28 attackspambots
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=56637  .  dstport=445  .     (3133)
2020-09-27 13:30:28
102.89.2.35 attackbotsspam
1596284160 - 08/01/2020 14:16:00 Host: 102.89.2.35/102.89.2.35 Port: 445 TCP Blocked
2020-08-02 04:02:25
102.89.2.186 attack
1588507600 - 05/03/2020 14:06:40 Host: 102.89.2.186/102.89.2.186 Port: 445 TCP Blocked
2020-05-04 03:08:15
102.89.2.49 attack
1588507603 - 05/03/2020 14:06:43 Host: 102.89.2.49/102.89.2.49 Port: 445 TCP Blocked
2020-05-04 03:06:54
102.89.2.34 attack
(pop3d) Failed POP3 login from 102.89.2.34 (NG/Nigeria/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr  1 02:00:35 ir1 dovecot[566034]: pop3-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=102.89.2.34, lip=5.63.12.44, session=
2020-04-01 06:55:48
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.89.2.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26432
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.89.2.40.			IN	A

;; AUTHORITY SECTION:
.			413	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060501 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 06 05:16:02 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 40.2.89.102.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.2.89.102.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
68.183.85.75 attackspambots
Feb 18 01:07:52 mout sshd[21481]: Invalid user jboss from 68.183.85.75 port 32810
2020-02-18 08:10:46
77.60.37.105 attackspambots
2019-12-10T20:35:11.897740suse-nuc sshd[13077]: Invalid user andre from 77.60.37.105 port 37127
...
2020-02-18 08:00:14
103.123.231.26 attack
firewall-block, port(s): 139/tcp
2020-02-18 08:09:02
77.81.230.143 attackspam
Invalid user saniya from 77.81.230.143 port 43090
2020-02-18 07:57:46
37.119.185.155 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 08:32:19
69.175.97.170 attackspam
2019-09-22T08:30:43.596901-07:00 suse-nuc sshd[11442]: Bad protocol version identification 'GET / HTTP/1.1' from 69.175.97.170 port 37183
...
2020-02-18 08:27:51
77.43.74.58 attackbots
Ssh brute force
2020-02-18 08:11:25
117.173.67.119 attack
Brute-force attempt banned
2020-02-18 08:02:07
211.72.239.243 attackspam
Ssh brute force
2020-02-18 08:22:01
77.221.146.47 attack
Feb 18 01:07:02 odroid64 sshd\[2033\]: Invalid user shl from 77.221.146.47
Feb 18 01:07:02 odroid64 sshd\[2033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.221.146.47
...
2020-02-18 08:18:31
37.119.54.124 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 08:20:34
77.147.91.221 attackbots
2020-02-09T05:59:06.477742suse-nuc sshd[10165]: Invalid user qbn from 77.147.91.221 port 51494
...
2020-02-18 08:33:31
77.194.59.160 attack
2019-12-06T09:16:49.348635suse-nuc sshd[28422]: Invalid user pi from 77.194.59.160 port 36174
...
2020-02-18 08:30:04
185.176.27.246 attackspam
Feb 17 23:51:20 h2177944 kernel: \[5177781.891472\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.246 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=53057 PROTO=TCP SPT=40930 DPT=6850 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 17 23:51:20 h2177944 kernel: \[5177781.891487\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.246 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=53057 PROTO=TCP SPT=40930 DPT=6850 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 18 00:52:05 h2177944 kernel: \[5181426.610493\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.246 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=48889 PROTO=TCP SPT=40930 DPT=7397 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 18 00:52:05 h2177944 kernel: \[5181426.610506\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.246 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=48889 PROTO=TCP SPT=40930 DPT=7397 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 18 00:52:05 h2177944 kernel: \[5181426.709513\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.246 DST=85.214.
2020-02-18 07:57:13
85.58.185.219 attackbots
firewall-block, port(s): 23/tcp
2020-02-18 07:57:28

Recently Reported IPs

77.231.66.214 67.59.204.70 37.131.22.130 99.170.84.26
127.174.254.51 50.84.53.26 134.255.105.146 128.65.183.8
58.125.165.242 177.69.212.161 199.143.106.154 213.136.80.210
104.14.245.131 103.148.148.10 84.152.129.57 166.215.156.138
104.46.224.17 61.125.233.164 85.229.238.3 36.79.253.194