Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Århus

Region: Central Jutland

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.109.8.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.109.8.161.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070101 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 01 13:46:44 CST 2020
;; MSG SIZE  rcvd: 115
Host info
161.8.109.2.in-addr.arpa domain name pointer 2-109-8-161-dynamic.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
161.8.109.2.in-addr.arpa	name = 2-109-8-161-dynamic.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.52.120.94 attack
1.52.120.94 - - [18/Oct/2019:07:39:23 -0400] "GET /?page=products&action=..%2f..%2fetc%2fpasswd%00&manufacturerID=61&productID=4701-RIM&linkID=16812 HTTP/1.1" 200 17420 "https://exitdevice.com/?page=products&action=..%2f..%2fetc%2fpasswd%00&manufacturerID=61&productID=4701-RIM&linkID=16812" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-10-18 23:31:43
88.214.26.45 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 91 - port: 8502 proto: TCP cat: Misc Attack
2019-10-18 23:39:22
96.127.158.237 attackspambots
3389BruteforceFW21
2019-10-18 23:29:36
51.254.206.149 attackbotsspam
2019-10-18T15:36:54.104792abusebot-4.cloudsearch.cf sshd\[10470\]: Invalid user 123456 from 51.254.206.149 port 37120
2019-10-18 23:43:13
144.217.166.92 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2019-10-18 23:17:59
222.186.15.246 attackbots
Oct 18 14:45:06 ip-172-31-1-72 sshd\[18891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.246  user=root
Oct 18 14:45:08 ip-172-31-1-72 sshd\[18891\]: Failed password for root from 222.186.15.246 port 18967 ssh2
Oct 18 14:46:01 ip-172-31-1-72 sshd\[18895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.246  user=root
Oct 18 14:46:03 ip-172-31-1-72 sshd\[18895\]: Failed password for root from 222.186.15.246 port 16798 ssh2
Oct 18 14:46:31 ip-172-31-1-72 sshd\[18897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.246  user=root
2019-10-18 23:19:15
92.151.64.207 attack
...
2019-10-18 23:26:50
218.92.0.204 attack
2019-10-18T14:50:41.353605abusebot-8.cloudsearch.cf sshd\[5864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
2019-10-18 23:20:15
138.68.12.43 attack
2019-10-18T15:23:28.099611abusebot-4.cloudsearch.cf sshd\[10415\]: Invalid user re from 138.68.12.43 port 43438
2019-10-18 23:55:32
121.204.148.98 attack
Oct 18 17:00:26 MK-Soft-VM5 sshd[3775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.148.98 
Oct 18 17:00:28 MK-Soft-VM5 sshd[3775]: Failed password for invalid user lsg from 121.204.148.98 port 39606 ssh2
...
2019-10-18 23:53:04
157.245.166.183 attack
B: Abusive content scan (200)
2019-10-19 00:00:48
182.73.123.118 attackspambots
Oct 18 14:57:32 vps647732 sshd[21861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118
Oct 18 14:57:34 vps647732 sshd[21861]: Failed password for invalid user pineapple from 182.73.123.118 port 32867 ssh2
...
2019-10-18 23:56:16
157.230.156.51 attackspambots
Oct 18 16:28:20 ns381471 sshd[18518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.156.51
Oct 18 16:28:22 ns381471 sshd[18518]: Failed password for invalid user waski from 157.230.156.51 port 38068 ssh2
Oct 18 16:32:52 ns381471 sshd[18650]: Failed password for root from 157.230.156.51 port 50020 ssh2
2019-10-18 23:25:33
129.211.110.175 attackspam
SSH Bruteforce attempt
2019-10-18 23:49:24
195.154.223.226 attack
$f2bV_matches
2019-10-18 23:31:17

Recently Reported IPs

5.183.45.99 217.12.216.122 189.6.141.5 44.182.254.185
75.206.16.197 54.224.175.15 40.51.107.47 213.58.176.130
78.247.170.48 67.94.78.173 45.228.254.181 75.230.206.229
122.117.101.196 53.42.81.204 118.99.94.35 114.34.25.52
114.33.27.191 84.188.241.171 198.211.184.63 113.53.81.71