Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kristiansand

Region: Agder

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 88.89.239.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39899
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;88.89.239.138.			IN	A

;; AUTHORITY SECTION:
.			398	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061502 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 16 07:30:01 CST 2020
;; MSG SIZE  rcvd: 117
Host info
138.239.89.88.in-addr.arpa domain name pointer ti0140a400-2685.bb.online.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.239.89.88.in-addr.arpa	name = ti0140a400-2685.bb.online.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.74.190.198 attackspam
Jan 21 14:28:49 web2 sshd[23213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.190.198
Jan 21 14:28:52 web2 sshd[23213]: Failed password for invalid user agustina from 182.74.190.198 port 54640 ssh2
2020-01-22 01:23:33
115.136.138.30 attack
Invalid user network from 115.136.138.30 port 38926
2020-01-22 01:38:50
71.198.158.5 attackspam
Unauthorized connection attempt detected from IP address 71.198.158.5 to port 2220 [J]
2020-01-22 01:49:16
179.154.239.138 attack
Unauthorized connection attempt detected from IP address 179.154.239.138 to port 2220 [J]
2020-01-22 01:25:05
147.139.5.31 attackspam
Invalid user r from 147.139.5.31 port 45686
2020-01-22 01:31:12
14.63.167.192 attackbots
Jan 21 17:56:18 DAAP sshd[32227]: Invalid user doom from 14.63.167.192 port 52446
Jan 21 17:56:18 DAAP sshd[32227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.167.192
Jan 21 17:56:18 DAAP sshd[32227]: Invalid user doom from 14.63.167.192 port 52446
Jan 21 17:56:20 DAAP sshd[32227]: Failed password for invalid user doom from 14.63.167.192 port 52446 ssh2
Jan 21 18:05:29 DAAP sshd[32346]: Invalid user daniel from 14.63.167.192 port 47426
...
2020-01-22 01:59:54
105.216.58.106 attack
Invalid user admin from 105.216.58.106 port 39505
2020-01-22 01:43:41
148.66.135.178 attackspambots
Jan 21 18:36:26 hosting sshd[10868]: Invalid user orca from 148.66.135.178 port 48610
...
2020-01-22 01:30:14
118.27.1.93 attack
Invalid user drew from 118.27.1.93 port 58928
2020-01-22 01:38:16
171.244.51.119 attackbotsspam
Unauthorized connection attempt detected from IP address 171.244.51.119 to port 2220 [J]
2020-01-22 01:26:44
106.13.55.24 attack
Unauthorized connection attempt detected from IP address 106.13.55.24 to port 2220 [J]
2020-01-22 01:42:52
2.143.21.82 attack
Invalid user admin from 2.143.21.82 port 51341
2020-01-22 02:01:12
45.40.133.205 attack
Invalid user ntps from 45.40.133.205 port 50784
2020-01-22 01:56:09
109.121.136.19 attack
Unauthorized connection attempt detected from IP address 109.121.136.19 to port 2220 [J]
2020-01-22 01:41:54
124.235.206.130 attackspambots
Invalid user melk from 124.235.206.130 port 39055
2020-01-22 01:33:57

Recently Reported IPs

195.242.134.21 196.93.167.180 92.175.58.53 78.47.249.250
197.135.32.205 197.252.161.86 145.118.51.252 220.161.102.96
70.104.189.150 104.208.71.74 170.40.70.134 97.142.49.72
218.232.150.89 162.51.36.45 203.168.235.81 90.66.152.187
199.216.197.27 60.88.201.73 184.154.139.19 208.107.205.168