Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tbilisi

Region: K'alak'i T'bilisi

Country: Georgia

Internet Service Provider: MagtiCom

Hostname: unknown

Organization: Magticom Ltd.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.172.144.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5772
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.172.144.89.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 14 22:52:07 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 89.144.172.109.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 89.144.172.109.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
59.125.61.102 attackspam
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 18:14:30
89.248.172.85 attackspambots
SmallBizIT.US 6 packets to tcp(10002,50100,51000,53289,53335,53399)
2020-05-23 18:01:23
36.230.86.112 attack
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 18:27:45
36.234.212.220 attackspam
Invalid user ubnt from 36.234.212.220 port 5825
2020-05-23 18:27:00
58.33.35.82 attackspam
Invalid user amf from 58.33.35.82 port 2337
2020-05-23 18:15:20
203.150.243.176 attackspam
Invalid user mmz from 203.150.243.176 port 50976
2020-05-23 18:36:33
37.49.226.40 attackspam
May 23 11:36:23 debian-2gb-nbg1-2 kernel: \[12485396.431547\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=37.49.226.40 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=5688 PROTO=TCP SPT=57952 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-23 18:26:08
36.233.123.44 attack
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 18:27:16
85.104.115.236 attackbots
Unauthorized connection attempt detected from IP address 85.104.115.236 to port 23
2020-05-23 18:03:08
218.94.125.234 attack
$f2bV_matches
2020-05-23 18:34:38
197.232.19.52 attackspambots
Invalid user jbw from 197.232.19.52 port 54846
2020-05-23 18:39:14
195.158.8.206 attackbots
Invalid user nla from 195.158.8.206 port 45556
2020-05-23 18:40:27
46.161.27.48 attackbotsspam
SmallBizIT.US 4 packets to tcp(4477,4488,5544,5588)
2020-05-23 18:19:48
49.232.168.32 attackspambots
May 23 05:52:28 ny01 sshd[11997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.168.32
May 23 05:52:30 ny01 sshd[11997]: Failed password for invalid user nhm from 49.232.168.32 port 36944 ssh2
May 23 05:56:43 ny01 sshd[12927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.168.32
2020-05-23 18:17:32
34.92.52.16 attackspambots
Unauthorized connection attempt detected from IP address 34.92.52.16 to port 22 [T]
2020-05-23 18:29:54

Recently Reported IPs

93.111.239.120 179.189.230.26 84.175.30.79 126.90.196.148
140.165.3.145 5.90.173.13 1.61.109.160 100.171.1.169
105.14.238.30 52.26.160.209 118.91.181.243 112.150.218.246
37.109.72.13 189.40.19.189 77.172.29.8 126.144.51.154
176.92.172.89 217.1.47.39 38.35.182.87 110.99.116.110