Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bergen

Region: Hordaland

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: Telenor Norge AS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.189.246.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38265
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.189.246.26.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 22 21:56:18 CST 2019
;; MSG SIZE  rcvd: 118

Host info
26.246.189.109.in-addr.arpa domain name pointer 26.246.189.109.customer.cdi.no.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
26.246.189.109.in-addr.arpa	name = 26.246.189.109.customer.cdi.no.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
157.230.245.91 attack
May 14 17:31:23 hell sshd[29435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.245.91
May 14 17:31:25 hell sshd[29435]: Failed password for invalid user debian from 157.230.245.91 port 40056 ssh2
...
2020-05-15 00:05:06
111.67.202.196 attackspam
May 14 14:33:00 ns382633 sshd\[20424\]: Invalid user wordpress from 111.67.202.196 port 45054
May 14 14:33:00 ns382633 sshd\[20424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.196
May 14 14:33:01 ns382633 sshd\[20424\]: Failed password for invalid user wordpress from 111.67.202.196 port 45054 ssh2
May 14 15:04:52 ns382633 sshd\[26288\]: Invalid user humpback from 111.67.202.196 port 53474
May 14 15:04:52 ns382633 sshd\[26288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.196
2020-05-14 23:38:59
58.210.197.234 attackbotsspam
May 14 10:36:56 askasleikir sshd[28388]: Failed password for invalid user postgres from 58.210.197.234 port 37498 ssh2
May 14 10:35:30 askasleikir sshd[28385]: Failed password for invalid user soto from 58.210.197.234 port 51008 ssh2
May 14 10:30:26 askasleikir sshd[28376]: Failed password for git from 58.210.197.234 port 40912 ssh2
2020-05-15 00:07:34
103.81.115.71 attackspambots
20/5/14@08:25:53: FAIL: Alarm-Network address from=103.81.115.71
...
2020-05-14 23:41:28
170.150.72.28 attackbotsspam
May 14 17:40:24 abendstille sshd\[30555\]: Invalid user wkadmin from 170.150.72.28
May 14 17:40:24 abendstille sshd\[30555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.150.72.28
May 14 17:40:26 abendstille sshd\[30555\]: Failed password for invalid user wkadmin from 170.150.72.28 port 57800 ssh2
May 14 17:44:47 abendstille sshd\[2253\]: Invalid user event from 170.150.72.28
May 14 17:44:47 abendstille sshd\[2253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.150.72.28
...
2020-05-14 23:47:41
189.209.191.241 attack
Automatic report - Port Scan Attack
2020-05-14 23:31:53
213.0.69.74 attackbotsspam
leo_www
2020-05-14 23:34:20
5.53.114.209 attack
May 13 01:34:04 v26 sshd[27531]: Invalid user ti from 5.53.114.209 port 19826
May 13 01:34:06 v26 sshd[27531]: Failed password for invalid user ti from 5.53.114.209 port 19826 ssh2
May 13 01:34:06 v26 sshd[27531]: Received disconnect from 5.53.114.209 port 19826:11: Bye Bye [preauth]
May 13 01:34:06 v26 sshd[27531]: Disconnected from 5.53.114.209 port 19826 [preauth]
May 13 01:36:16 v26 sshd[27866]: Invalid user gustav from 5.53.114.209 port 23662
May 13 01:36:18 v26 sshd[27866]: Failed password for invalid user gustav from 5.53.114.209 port 23662 ssh2
May 13 01:36:18 v26 sshd[27866]: Received disconnect from 5.53.114.209 port 23662:11: Bye Bye [preauth]
May 13 01:36:18 v26 sshd[27866]: Disconnected from 5.53.114.209 port 23662 [preauth]
May 13 01:37:08 v26 sshd[27991]: Invalid user tomcat from 5.53.114.209 port 26071
May 13 01:37:09 v26 sshd[27991]: Failed password for invalid user tomcat from 5.53.114.209 port 26071 ssh2
May 13 01:37:09 v26 sshd[27991]: Received disco........
-------------------------------
2020-05-15 00:03:48
132.232.30.87 attackbots
May 14 14:51:35 PorscheCustomer sshd[30354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.30.87
May 14 14:51:37 PorscheCustomer sshd[30354]: Failed password for invalid user odroid from 132.232.30.87 port 48572 ssh2
May 14 14:54:25 PorscheCustomer sshd[30419]: Failed password for ubuntu from 132.232.30.87 port 51316 ssh2
...
2020-05-14 23:49:14
46.101.73.64 attack
May 14 15:10:11 onepixel sshd[3551201]: Failed password for invalid user service1 from 46.101.73.64 port 33778 ssh2
May 14 15:14:02 onepixel sshd[3551686]: Invalid user december from 46.101.73.64 port 40952
May 14 15:14:02 onepixel sshd[3551686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.73.64 
May 14 15:14:02 onepixel sshd[3551686]: Invalid user december from 46.101.73.64 port 40952
May 14 15:14:05 onepixel sshd[3551686]: Failed password for invalid user december from 46.101.73.64 port 40952 ssh2
2020-05-14 23:45:27
95.211.209.158 attack
Disguised BOT - reads robots with FAKE UA then ignores 403 returns and tries scraping anyway - as ever from this ISP/COUNTRY
2020-05-14 23:59:19
31.163.156.103 attack
Triggered: repeated knocking on closed ports.
2020-05-14 23:33:40
149.56.15.98 attackspambots
May 14 16:50:13 ns382633 sshd\[13525\]: Invalid user gtadmin from 149.56.15.98 port 32898
May 14 16:50:13 ns382633 sshd\[13525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.15.98
May 14 16:50:15 ns382633 sshd\[13525\]: Failed password for invalid user gtadmin from 149.56.15.98 port 32898 ssh2
May 14 16:53:56 ns382633 sshd\[13846\]: Invalid user help from 149.56.15.98 port 33684
May 14 16:53:56 ns382633 sshd\[13846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.15.98
2020-05-15 00:05:36
175.24.4.159 attack
May 14 14:04:14 ns382633 sshd\[15017\]: Invalid user server from 175.24.4.159 port 52766
May 14 14:04:14 ns382633 sshd\[15017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.4.159
May 14 14:04:16 ns382633 sshd\[15017\]: Failed password for invalid user server from 175.24.4.159 port 52766 ssh2
May 14 14:25:38 ns382633 sshd\[19237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.4.159  user=root
May 14 14:25:40 ns382633 sshd\[19237\]: Failed password for root from 175.24.4.159 port 37070 ssh2
2020-05-14 23:52:33
103.40.22.89 attackbots
May 14 12:58:32 *** sshd[22303]: Invalid user mc from 103.40.22.89
2020-05-14 23:35:22

Recently Reported IPs

39.74.253.152 139.108.1.107 145.37.245.12 107.146.224.195
197.221.57.93 112.120.190.167 177.180.194.124 125.198.169.195
38.118.232.94 102.49.114.242 74.245.85.179 194.85.93.190
153.205.166.253 221.14.192.75 122.32.237.193 155.253.240.99
122.223.180.0 79.8.3.31 159.201.67.230 111.1.5.55