Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oslo

Region: Oslo

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.247.89.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4182
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.247.89.142.			IN	A

;; AUTHORITY SECTION:
.			463	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050200 1800 900 604800 86400

;; Query time: 129 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 21:17:16 CST 2020
;; MSG SIZE  rcvd: 118
Host info
142.89.247.109.in-addr.arpa domain name pointer 142.109-247-89.customer.lyse.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.89.247.109.in-addr.arpa	name = 142.109-247-89.customer.lyse.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
181.60.79.253 attack
Aug 11 07:45:31 cosmoit sshd[23620]: Failed password for root from 181.60.79.253 port 38682 ssh2
2020-08-11 16:28:30
111.229.110.107 attackspambots
[ssh] SSH attack
2020-08-11 16:39:42
222.254.72.238 attack
Email rejected due to spam filtering
2020-08-11 17:10:57
171.244.51.114 attack
Aug 11 07:29:36 cosmoit sshd[22683]: Failed password for root from 171.244.51.114 port 59084 ssh2
2020-08-11 17:06:05
81.27.254.86 attackbotsspam
ssh brute force
2020-08-11 16:31:38
43.240.103.180 attack
1597117875 - 08/11/2020 05:51:15 Host: 43.240.103.180/43.240.103.180 Port: 445 TCP Blocked
2020-08-11 17:05:19
167.114.113.141 attackbots
$f2bV_matches
2020-08-11 16:52:11
112.85.42.172 attackspam
Aug 11 10:49:32 ip40 sshd[8743]: Failed password for root from 112.85.42.172 port 46308 ssh2
Aug 11 10:49:36 ip40 sshd[8743]: Failed password for root from 112.85.42.172 port 46308 ssh2
...
2020-08-11 16:53:26
83.2.189.64 attack
(smtpauth) Failed SMTP AUTH login from 83.2.189.64 (PL/Poland/multinet-4-64.kal.pl): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-11 08:21:15 plain authenticator failed for ([83.2.189.64]) [83.2.189.64]: 535 Incorrect authentication data (set_id=info)
2020-08-11 17:04:24
180.123.118.214 attack
Email rejected due to spam filtering
2020-08-11 17:02:52
118.27.11.168 attackbots
Aug 11 06:17:54 ns382633 sshd\[24386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.11.168  user=root
Aug 11 06:17:55 ns382633 sshd\[24386\]: Failed password for root from 118.27.11.168 port 51126 ssh2
Aug 11 06:20:03 ns382633 sshd\[24643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.11.168  user=root
Aug 11 06:20:06 ns382633 sshd\[24643\]: Failed password for root from 118.27.11.168 port 46692 ssh2
Aug 11 06:20:40 ns382633 sshd\[25131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.11.168  user=root
2020-08-11 16:27:07
106.52.200.86 attack
Aug 11 06:03:32 meumeu sshd[421149]: Invalid user 123qwE from 106.52.200.86 port 54956
Aug 11 06:03:32 meumeu sshd[421149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.200.86 
Aug 11 06:03:32 meumeu sshd[421149]: Invalid user 123qwE from 106.52.200.86 port 54956
Aug 11 06:03:34 meumeu sshd[421149]: Failed password for invalid user 123qwE from 106.52.200.86 port 54956 ssh2
Aug 11 06:05:47 meumeu sshd[421202]: Invalid user SERVER from 106.52.200.86 port 50014
Aug 11 06:05:47 meumeu sshd[421202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.200.86 
Aug 11 06:05:47 meumeu sshd[421202]: Invalid user SERVER from 106.52.200.86 port 50014
Aug 11 06:05:50 meumeu sshd[421202]: Failed password for invalid user SERVER from 106.52.200.86 port 50014 ssh2
Aug 11 06:08:09 meumeu sshd[421264]: Invalid user testftpadmin from 106.52.200.86 port 45072
...
2020-08-11 16:35:06
222.186.30.35 attackspam
11.08.2020 08:36:26 SSH access blocked by firewall
2020-08-11 16:42:29
101.65.160.121 attackbots
Excessive Port-Scanning
2020-08-11 16:59:26
122.51.21.208 attackbots
sshd jail - ssh hack attempt
2020-08-11 16:43:40

Recently Reported IPs

85.108.1.136 51.218.67.183 222.247.104.223 193.170.114.138
54.38.71.184 52.229.10.213 34.82.49.225 102.94.231.104
180.21.234.26 112.28.55.154 71.207.207.96 123.191.17.219
162.243.139.191 147.254.45.5 71.25.2.14 27.64.90.51
67.42.74.206 63.2.39.119 129.121.170.25 34.189.118.249