Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: Tele2

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '195.8.98.0 - 195.8.98.255'

% Abuse contact for '195.8.98.0 - 195.8.98.255' is 'abuse@unikom.se'

inetnum:        195.8.98.0 - 195.8.98.255
netname:        OSTRAGOINGE-PI-NET
country:        SE
org:            ORG-OGK3-RIPE
admin-c:        RW1394-RIPE
admin-c:        RONI2-RIPE
tech-c:         RW1394-RIPE
tech-c:         RONI2-RIPE
status:         ASSIGNED PI
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         RESILANS-MNT
mnt-routes:     RESILANS-MNT
mnt-routes:     AS1257-MNT
mnt-domains:    RESILANS-MNT
created:        2005-01-12T10:36:13Z
last-modified:  2024-05-23T12:43:54Z
source:         RIPE # Filtered
sponsoring-org: ORG-RESI1-RIPE

organisation:   ORG-OGK3-RIPE
org-name:       Ostra Goinge Kommun
country:        SE
org-type:       OTHER
address:        Storgatan 4
address:        SE-280 60 Broby
address:        Sweden
abuse-c:        OGK6-RIPE
mnt-ref:        RESILANS-MNT
mnt-by:         RESILANS-MNT
created:        2014-11-18T15:13:44Z
last-modified:  2022-12-01T16:40:54Z
source:         RIPE # Filtered

person:         Robin Nilsson
address:        IT Kommuner i Skane AB
address:        Torggatan 2
address:        SE-242 31 Horby
address:        Sweden
phone:          +46 10 219 15 77
nic-hdl:        RONI2-RIPE
mnt-by:         RESILANS-MNT
created:        2023-12-08T13:50:49Z
last-modified:  2024-08-15T12:29:10Z
source:         RIPE # Filtered

person:         Richard Wanstadius
address:        Hassleholms Kommun
address:        Stadshuset
address:        SE-28180 Hassleholm
address:        Sweden
phone:          +46-451-267222
fax-no:         +46-451-81406
nic-hdl:        RW1394-RIPE
mnt-by:         EBBnet-MNT
created:        2005-03-03T12:35:15Z
last-modified:  2005-12-22T09:39:13Z
source:         RIPE # Filtered

% Information related to '195.8.98.0/24AS1257'

route:          195.8.98.0/24
descr:          TELE2/ SWIPNET
descr:          TELE2-Broby
descr:          #####################################################
descr:          In case of improper use originating from our network,
descr:          please mail customer or 
descr:          ####################################################
origin:         AS1257
mnt-by:         AS1257-MNT
mnt-routes:     RESILANS-MNT
created:        2015-10-30T07:39:26Z
last-modified:  2024-04-12T11:10:33Z
source:         RIPE # Filtered

% Information related to '195.8.98.0/24AS213701'

route:          195.8.98.0/24
descr:          Ostra Goinge Kommun
origin:         AS213701
mnt-by:         RESILANS-MNT
created:        2024-12-17T13:00:08Z
last-modified:  2024-12-17T13:00:08Z
source:         RIPE

% Information related to '195.8.98.0/24AS214202'

route:          195.8.98.0/24
descr:          Ostra Goinge Kommun
origin:         AS214202
mnt-by:         RESILANS-MNT
created:        2025-05-28T08:32:19Z
last-modified:  2025-05-28T08:32:19Z
source:         RIPE

% Information related to '195.8.98.0/24AS215138'

route:          195.8.98.0/24
descr:          Ostra Goinge Kommun
origin:         AS215138
mnt-by:         RESILANS-MNT
created:        2025-05-28T08:32:19Z
last-modified:  2025-05-28T08:32:19Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.8.98.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.8.98.59.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032801 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 29 11:29:23 CST 2026
;; MSG SIZE  rcvd: 104
Host info
Host 59.98.8.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 59.98.8.195.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.168.8.229 attack
$f2bV_matches
2020-04-14 02:05:42
66.70.160.187 attack
66.70.160.187 - - [13/Apr/2020:19:20:17 +0200] "GET /wp-login.php HTTP/1.1" 200 5879 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
66.70.160.187 - - [13/Apr/2020:19:20:19 +0200] "POST /wp-login.php HTTP/1.1" 200 6778 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
66.70.160.187 - - [13/Apr/2020:19:20:21 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-14 02:06:04
114.106.157.219 attackspambots
Apr 14 03:15:42 our-server-hostname postfix/smtpd[7251]: connect from unknown[114.106.157.219]
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.106.157.219
2020-04-14 01:39:10
1.55.94.99 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 13-04-2020 18:20:07.
2020-04-14 02:19:52
125.64.94.221 attackbots
firewall-block, port(s): 43/tcp
2020-04-14 02:13:44
164.132.42.32 attackspam
$f2bV_matches
2020-04-14 01:44:23
220.167.89.108 attackspambots
" "
2020-04-14 01:55:46
111.230.152.175 attackbots
Apr 13 18:20:27 pi sshd[10793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.152.175  user=root
Apr 13 18:20:29 pi sshd[10793]: Failed password for invalid user root from 111.230.152.175 port 39698 ssh2
2020-04-14 01:58:43
107.175.150.83 attackspam
2020-04-13T17:52:26.536099shield sshd\[29010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.150.83  user=root
2020-04-13T17:52:28.263629shield sshd\[29010\]: Failed password for root from 107.175.150.83 port 57427 ssh2
2020-04-13T17:56:19.025167shield sshd\[29943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.150.83  user=root
2020-04-13T17:56:21.405079shield sshd\[29943\]: Failed password for root from 107.175.150.83 port 33067 ssh2
2020-04-13T18:00:09.044101shield sshd\[30820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.150.83  user=root
2020-04-14 02:00:20
103.72.144.228 attackbotsspam
Apr 13 19:14:37 OPSO sshd\[17885\]: Invalid user dnjenga from 103.72.144.228 port 48130
Apr 13 19:14:37 OPSO sshd\[17885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.144.228
Apr 13 19:14:40 OPSO sshd\[17885\]: Failed password for invalid user dnjenga from 103.72.144.228 port 48130 ssh2
Apr 13 19:20:48 OPSO sshd\[19379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.144.228  user=root
Apr 13 19:20:50 OPSO sshd\[19379\]: Failed password for root from 103.72.144.228 port 56500 ssh2
2020-04-14 01:39:41
159.89.133.144 attackbotsspam
firewall-block, port(s): 25769/tcp
2020-04-14 02:08:49
13.235.153.231 attack
WordPress wp-login brute force :: 13.235.153.231 0.140 - [13/Apr/2020:17:20:53  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1804 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-04-14 01:38:26
51.254.227.222 attackbotsspam
[MK-Root1] SSH login failed
2020-04-14 01:43:31
86.188.246.2 attackbotsspam
Found by fail2ban
2020-04-14 01:38:13
113.62.127.195 attackbots
CN_APNIC-HM_<177>1586798448 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]:  {TCP} 113.62.127.195:54750
2020-04-14 01:42:52

Recently Reported IPs

5.252.18.193 46.101.36.170 142.93.88.159 61.240.193.45
120.14.88.57 117.176.130.124 115.63.113.98 112.49.113.150
111.208.81.74 110.245.38.140 10.225.136.177 2606:4700:10::6816:4697
2606:4700:10::6814:6000 2606:4700:10::6814:9507 2606:4700:10::6816:3104 2606:4700:10::6816:1864
2606:4700:10::ac43:2672 2606:4700:10::6816:3493 2606:4700:10::6814:7332 2606:4700:10::6814:7828