Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.89.157.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.89.157.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 21:34:56 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 2.157.89.193.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.157.89.193.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.72.210.210 attackspam
20/2/27@23:50:39: FAIL: Alarm-Network address from=182.72.210.210
...
2020-02-28 19:07:32
129.226.174.139 attack
Feb 28 05:26:45 plusreed sshd[18836]: Invalid user zhaoshaojing from 129.226.174.139
...
2020-02-28 18:41:05
198.23.189.18 attackbotsspam
*Port Scan* detected from 198.23.189.18 (US/United States/198-23-189-18-host.colocrossing.com). 4 hits in the last 140 seconds
2020-02-28 18:39:27
81.233.35.117 attackspambots
unauthorized connection attempt
2020-02-28 18:50:41
182.155.121.17 attackbots
23/tcp 23/tcp
[2020-02-28]2pkt
2020-02-28 18:59:11
168.195.141.66 attackspam
W 31101,/var/log/nginx/access.log,-,-
2020-02-28 18:56:38
222.65.144.5 attack
Feb 28 10:45:30 MK-Soft-VM8 sshd[14747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.65.144.5 
Feb 28 10:45:32 MK-Soft-VM8 sshd[14747]: Failed password for invalid user gitlab-runner from 222.65.144.5 port 53268 ssh2
...
2020-02-28 18:51:17
170.231.199.250 attack
23/tcp
[2020-02-28]1pkt
2020-02-28 18:29:06
68.207.18.193 attackspam
Honeypot attack, port: 5555, PTR: cpe-68-207-18-193.stx.res.rr.com.
2020-02-28 18:54:53
212.64.27.53 attackspambots
2020-02-28T06:51:57.666195shield sshd\[14058\]: Invalid user git from 212.64.27.53 port 58044
2020-02-28T06:51:57.670805shield sshd\[14058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.27.53
2020-02-28T06:51:59.342687shield sshd\[14058\]: Failed password for invalid user git from 212.64.27.53 port 58044 ssh2
2020-02-28T06:54:12.610751shield sshd\[14624\]: Invalid user jenkins from 212.64.27.53 port 38642
2020-02-28T06:54:12.617465shield sshd\[14624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.27.53
2020-02-28 19:09:24
80.81.110.50 attackspam
20/2/27@23:51:23: FAIL: Alarm-Network address from=80.81.110.50
...
2020-02-28 18:28:05
222.186.52.139 attackbots
Automatic report BANNED IP
2020-02-28 18:33:42
218.92.0.175 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Failed password for root from 218.92.0.175 port 28895 ssh2
Failed password for root from 218.92.0.175 port 28895 ssh2
Failed password for root from 218.92.0.175 port 28895 ssh2
Failed password for root from 218.92.0.175 port 28895 ssh2
2020-02-28 18:31:24
112.217.225.59 attack
Feb 28 11:38:26 ns381471 sshd[17768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.225.59
Feb 28 11:38:29 ns381471 sshd[17768]: Failed password for invalid user tomcat7 from 112.217.225.59 port 34606 ssh2
2020-02-28 19:04:36
106.13.149.187 attackspam
Feb 28 11:59:48 minden010 sshd[32226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.149.187
Feb 28 11:59:50 minden010 sshd[32226]: Failed password for invalid user jira from 106.13.149.187 port 37560 ssh2
Feb 28 12:07:01 minden010 sshd[2447]: Failed password for root from 106.13.149.187 port 37880 ssh2
...
2020-02-28 19:10:53

Recently Reported IPs

250.131.129.46 147.40.232.20 252.224.160.144 114.31.17.93
254.47.142.53 234.90.202.182 169.37.189.47 237.67.170.247
131.208.130.32 223.243.10.104 170.241.158.24 245.121.72.189
132.39.113.102 27.148.15.255 233.133.80.204 103.84.65.14
196.42.95.153 96.7.157.70 75.97.159.132 222.194.186.138