Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oslo

Region: Oslo County

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.16.38.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8927
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;77.16.38.189.			IN	A

;; AUTHORITY SECTION:
.			460	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091001 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 11 09:14:40 CST 2020
;; MSG SIZE  rcvd: 116
Host info
189.38.16.77.in-addr.arpa domain name pointer 77.16.38.189.tmi.telenormobil.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.38.16.77.in-addr.arpa	name = 77.16.38.189.tmi.telenormobil.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.199.113.140 attack
Invalid user asterisk from 139.199.113.140 port 59708
2019-12-24 21:37:54
119.42.175.200 attackspambots
Dec 24 13:23:08 server sshd\[14008\]: Invalid user mount1 from 119.42.175.200
Dec 24 13:23:08 server sshd\[14008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.42.175.200 
Dec 24 13:23:09 server sshd\[14008\]: Failed password for invalid user mount1 from 119.42.175.200 port 40230 ssh2
Dec 24 13:35:10 server sshd\[17356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.42.175.200  user=root
Dec 24 13:35:12 server sshd\[17356\]: Failed password for root from 119.42.175.200 port 49421 ssh2
...
2019-12-24 21:28:05
183.82.100.186 attackbots
1577171669 - 12/24/2019 08:14:29 Host: 183.82.100.186/183.82.100.186 Port: 445 TCP Blocked
2019-12-24 21:31:30
5.89.10.81 attackspam
ssh brute force
2019-12-24 21:38:20
222.186.175.161 attackspam
--- report ---
Dec 24 10:16:59 sshd: Connection from 222.186.175.161 port 59678
Dec 24 10:17:09 sshd: Received disconnect from 222.186.175.161: 11:  [preauth]
2019-12-24 21:32:28
138.197.162.32 attack
Dec 24 11:49:46 vpn01 sshd[31395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.32
Dec 24 11:49:48 vpn01 sshd[31395]: Failed password for invalid user harmony from 138.197.162.32 port 51142 ssh2
...
2019-12-24 21:20:41
106.12.46.104 attack
Dec 24 14:22:47 dedicated sshd[13772]: Invalid user 1QAZ3EDC from 106.12.46.104 port 47558
2019-12-24 21:55:45
165.227.204.253 attackspambots
165.227.204.253 - - [24/Dec/2019:07:14:01 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.204.253 - - [24/Dec/2019:07:14:05 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-24 21:42:39
64.185.3.117 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-12-24 21:56:06
133.242.155.85 attack
Dec 24 14:18:33 mout sshd[3058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.242.155.85  user=root
Dec 24 14:18:35 mout sshd[3058]: Failed password for root from 133.242.155.85 port 49484 ssh2
2019-12-24 21:23:57
49.234.206.45 attackspam
ssh brute force
2019-12-24 21:56:33
173.44.36.101 attackbots
1,23-14/07 [bc01/m09] PostRequest-Spammer scoring: paris
2019-12-24 21:53:41
54.36.148.8 attackspam
Automatic report - Banned IP Access
2019-12-24 21:46:43
61.2.151.226 attackspambots
1577171674 - 12/24/2019 08:14:34 Host: 61.2.151.226/61.2.151.226 Port: 445 TCP Blocked
2019-12-24 21:29:57
197.41.7.244 attack
wget call in url
2019-12-24 21:33:05

Recently Reported IPs

201.149.217.17 69.146.116.176 154.115.245.11 66.191.215.86
188.194.115.8 172.68.63.19 23.31.197.123 222.205.98.54
61.231.55.162 200.48.72.9 170.150.215.28 208.51.247.70
141.10.26.190 172.83.241.101 80.227.119.114 116.181.10.81
160.68.83.45 203.217.102.28 178.169.171.129 219.157.200.83