Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Enschede

Region: Overijssel

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.89.169.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27836
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.89.169.2.			IN	A

;; AUTHORITY SECTION:
.			286	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023062802 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 29 08:56:01 CST 2023
;; MSG SIZE  rcvd: 105
Host info
2.169.89.130.in-addr.arpa domain name pointer mobiel169002.mobiel.utwente.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.169.89.130.in-addr.arpa	name = mobiel169002.mobiel.utwente.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
85.100.127.105 attack
Automatic report - Banned IP Access
2020-06-08 13:24:36
218.161.122.14 attack
23/tcp
[2020-06-08]1pkt
2020-06-08 13:20:53
110.137.37.32 attackspambots
445/tcp
[2020-06-08]1pkt
2020-06-08 13:20:27
190.186.29.211 attackspambots
445/tcp
[2020-06-08]1pkt
2020-06-08 12:58:27
195.138.93.233 attackbots
Automatic report - Banned IP Access
2020-06-08 13:00:11
122.114.189.58 attackbots
$f2bV_matches
2020-06-08 13:11:35
107.170.37.74 attackbots
SSH Brute Force
2020-06-08 13:04:56
123.24.245.177 attackbots
445/tcp
[2020-06-08]1pkt
2020-06-08 13:12:27
137.116.128.105 attack
Jun  8 06:20:06 alice sshd[5175]: Failed password for r.r from 137.116.128.105 port 2624 ssh2
Jun  8 06:22:01 alice sshd[5315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.116.128.105  user=r.r
Jun  8 06:22:03 alice sshd[5315]: Failed password for r.r from 137.116.128.105 port 2624 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=137.116.128.105
2020-06-08 12:49:01
152.246.159.5 attackbots
2323/tcp
[2020-06-08]1pkt
2020-06-08 13:04:15
36.67.143.23 attackbots
445/tcp 445/tcp 445/tcp
[2020-06-08]3pkt
2020-06-08 13:05:47
51.77.109.98 attack
2020-06-08T04:48:53.083582shield sshd\[30865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.109.98  user=root
2020-06-08T04:48:54.795907shield sshd\[30865\]: Failed password for root from 51.77.109.98 port 45994 ssh2
2020-06-08T04:53:00.528135shield sshd\[32014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.109.98  user=root
2020-06-08T04:53:01.816396shield sshd\[32014\]: Failed password for root from 51.77.109.98 port 46986 ssh2
2020-06-08T04:57:11.625639shield sshd\[611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.109.98  user=root
2020-06-08 13:14:47
42.200.142.45 attackspam
Repeated brute force against a port
2020-06-08 12:54:45
74.105.72.152 attackbots
SSH invalid-user multiple login try
2020-06-08 12:43:44
183.230.108.191 attackspam
"Unauthorized connection attempt on SSHD detected"
2020-06-08 13:08:42

Recently Reported IPs

205.251.196.90 101.6.69.174 129.13.170.200 140.116.253.166
128.187.21.38 147.47.62.19 140.116.250.49 128.8.197.18
34.217.108.168 212.26.18.41 205.251.192.235 119.78.67.166
140.113.72.111 128.61.104.65 185.24.64.42 158.130.113.130
134.208.58.156 134.147.174.87 140.116.177.21 193.233.188.158