Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gateshead

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 86.18.138.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;86.18.138.89.			IN	A

;; AUTHORITY SECTION:
.			551	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042502 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 26 05:37:39 CST 2020
;; MSG SIZE  rcvd: 116
Host info
89.138.18.86.in-addr.arpa domain name pointer cpc153939-gate13-2-0-cust600.16-2.cable.virginm.net.
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

Non-authoritative answer:
89.138.18.86.in-addr.arpa	name = cpc153939-gate13-2-0-cust600.16-2.cable.virginm.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
134.90.149.147 attack
(From park-mihyang@hanmail.net) Fоrex + Bitcoin = $ 7000 per wеeк: https://ecuadortenisclub.com/earnmoney120224
2020-02-20 13:31:20
106.13.81.181 attackbotsspam
Feb 20 05:56:44 jane sshd[1590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.181 
Feb 20 05:56:46 jane sshd[1590]: Failed password for invalid user ftpuser from 106.13.81.181 port 45578 ssh2
...
2020-02-20 13:33:28
149.255.26.250 attackspambots
DATE:2020-02-20 05:55:16, IP:149.255.26.250, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-20 13:19:31
111.91.86.119 attackspambots
Fail2Ban Ban Triggered
2020-02-20 13:17:32
82.162.56.186 attackspam
honeypot forum registration (user=upypdvss; email=jodspukr@gmail.com)
2020-02-20 13:19:05
114.242.153.10 attackspam
Invalid user hammer from 114.242.153.10 port 53054
2020-02-20 09:58:42
51.75.209.225 attackspambots
Brute forcing email accounts
2020-02-20 13:27:00
220.135.33.131 attackspambots
Honeypot attack, port: 4567, PTR: 220-135-33-131.HINET-IP.hinet.net.
2020-02-20 10:03:06
106.12.74.123 attackspam
Fail2Ban Ban Triggered
2020-02-20 13:13:31
198.245.53.242 attack
$f2bV_matches
2020-02-20 13:15:48
188.255.110.212 attack
Feb 20 07:57:08 server sshd\[21543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-188-255-110-212.ip.moscow.rt.ru  user=root
Feb 20 07:57:10 server sshd\[21543\]: Failed password for root from 188.255.110.212 port 58222 ssh2
Feb 20 07:57:12 server sshd\[21543\]: Failed password for root from 188.255.110.212 port 58222 ssh2
Feb 20 07:57:14 server sshd\[21543\]: Failed password for root from 188.255.110.212 port 58222 ssh2
Feb 20 07:57:16 server sshd\[21543\]: Failed password for root from 188.255.110.212 port 58222 ssh2
...
2020-02-20 13:11:53
103.207.39.228 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2020-02-20 10:02:02
80.82.65.74 attackbotsspam
02/19/2020-23:57:23.974369 80.82.65.74 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-20 13:08:13
94.191.89.180 attackbotsspam
Invalid user action from 94.191.89.180 port 38036
2020-02-20 10:02:24
165.227.104.253 attackbotsspam
1582174604 - 02/20/2020 05:56:44 Host: 165.227.104.253/165.227.104.253 Port: 22 TCP Blocked
2020-02-20 13:34:49

Recently Reported IPs

67.220.187.50 89.66.28.115 67.247.34.233 204.199.188.235
115.95.127.19 201.255.99.208 177.229.23.199 185.198.64.120
2.104.149.79 217.163.205.228 32.60.73.191 24.42.239.154
89.223.28.175 67.35.1.222 202.82.171.68 154.236.25.86
83.29.88.228 124.28.132.209 169.38.131.81 182.63.158.157