Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stockholm

Region: Stockholms

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       192.109.166.0 - 192.109.241.255
CIDR:           192.109.192.0/19, 192.109.224.0/20, 192.109.166.0/23, 192.109.176.0/20, 192.109.240.0/23, 192.109.168.0/21
NetName:        RIPE-ERX-192-109-121-0
NetHandle:      NET-192-109-166-0-1
Parent:         NET192 (NET-192-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2005-01-31
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/192.109.166.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.109.200.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19131
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.109.200.157.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030602 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 07 13:31:16 CST 2026
;; MSG SIZE  rcvd: 108
Host info
157.200.109.192.in-addr.arpa domain name pointer gabbyshock.ptr.network.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.200.109.192.in-addr.arpa	name = gabbyshock.ptr.network.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.84.251.62 attackbots
Helo
2019-08-10 17:12:52
185.220.101.5 attackbotsspam
Brute Force Joomla Admin Login
2019-08-10 17:14:59
185.175.93.3 attackbotsspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-08-10 16:36:01
46.3.96.69 attackspam
Multiport scan : 17 ports scanned 1564 1787 1879 1880 1887 1889 1899 10000 14000 15000 16000 21000 22000 24000 27000 28000 29000
2019-08-10 16:48:19
69.64.45.37 attackbotsspam
WP_xmlrpc_attack
2019-08-10 16:58:23
157.230.190.1 attackbots
Aug 10 11:01:31 localhost sshd\[611\]: Invalid user carol from 157.230.190.1 port 47292
Aug 10 11:01:31 localhost sshd\[611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.1
Aug 10 11:01:33 localhost sshd\[611\]: Failed password for invalid user carol from 157.230.190.1 port 47292 ssh2
2019-08-10 17:11:32
139.219.133.155 attack
Automatic report - Banned IP Access
2019-08-10 16:54:31
54.219.168.168 attackspambots
port scan and connect, tcp 8443 (https-alt)
2019-08-10 16:37:35
81.22.45.251 attack
Aug 10 08:38:39 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.251 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=10988 PROTO=TCP SPT=54047 DPT=3491 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-08-10 17:05:18
201.212.227.95 attackbotsspam
Aug 10 09:51:39 pornomens sshd\[10637\]: Invalid user jane from 201.212.227.95 port 47600
Aug 10 09:51:39 pornomens sshd\[10637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.227.95
Aug 10 09:51:41 pornomens sshd\[10637\]: Failed password for invalid user jane from 201.212.227.95 port 47600 ssh2
...
2019-08-10 16:56:05
41.111.135.196 attack
Aug 10 06:46:40 [host] sshd[8739]: Invalid user bbb from 41.111.135.196
Aug 10 06:46:40 [host] sshd[8739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.111.135.196
Aug 10 06:46:43 [host] sshd[8739]: Failed password for invalid user bbb from 41.111.135.196 port 37086 ssh2
2019-08-10 16:44:02
212.87.9.155 attackbots
Aug 10 11:32:47 srv-4 sshd\[15763\]: Invalid user sven from 212.87.9.155
Aug 10 11:32:47 srv-4 sshd\[15763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.87.9.155
Aug 10 11:32:49 srv-4 sshd\[15763\]: Failed password for invalid user sven from 212.87.9.155 port 37478 ssh2
...
2019-08-10 17:08:11
107.175.101.134 attackspam
Postfix RBL failed
2019-08-10 16:26:50
158.69.222.2 attackspam
Aug 10 06:59:18 SilenceServices sshd[19008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.222.2
Aug 10 06:59:19 SilenceServices sshd[19008]: Failed password for invalid user feedback from 158.69.222.2 port 46720 ssh2
Aug 10 07:03:39 SilenceServices sshd[22188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.222.2
2019-08-10 16:24:32
5.153.234.10 attackbots
Aug 10 10:49:53 v22019058497090703 sshd[1196]: Failed password for root from 5.153.234.10 port 52872 ssh2
Aug 10 10:50:15 v22019058497090703 sshd[1209]: Failed password for root from 5.153.234.10 port 34730 ssh2
...
2019-08-10 17:06:49

Recently Reported IPs

36.34.20.79 183.250.141.96 183.239.223.149 183.198.232.227
175.42.161.34 175.42.161.176 120.219.236.45 117.189.22.183
112.50.44.211 111.23.215.76 2606:4700:10::6814:8793 2606:4700:10::ac43:2795
2606:4700:10::6816:4075 2606:4700:10::6814:5944 2606:4700:10::6816:4852 2606:4700:10::6814:9777
110.78.156.130 2606:4700:10::6816:2624 2606:4700:10::6814:7532 164.155.74.110