Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tampere

Region: Pirkanmaa

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.106.54.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;89.106.54.103.			IN	A

;; AUTHORITY SECTION:
.			533	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022002 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:52:55 CST 2020
;; MSG SIZE  rcvd: 117
Host info
103.54.106.89.in-addr.arpa domain name pointer ip-54-103.dhcp.opintanner.fi.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
103.54.106.89.in-addr.arpa	name = ip-54-103.dhcp.opintanner.fi.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.8.24.30 attack
Unauthorized connection attempt from IP address 213.8.24.30 on Port 445(SMB)
2019-08-10 17:38:00
69.162.113.233 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08101032)
2019-08-10 17:23:23
122.4.224.5 attackbotsspam
Unauthorized connection attempt from IP address 122.4.224.5 on Port 445(SMB)
2019-08-10 17:49:09
88.26.254.242 attack
Unauthorized connection attempt from IP address 88.26.254.242 on Port 445(SMB)
2019-08-10 17:45:18
125.212.178.27 attackspam
Unauthorized connection attempt from IP address 125.212.178.27 on Port 445(SMB)
2019-08-10 17:35:09
106.75.15.108 attackbotsspam
Unauthorized connection attempt from IP address 106.75.15.108 on Port 3306(MYSQL)
2019-08-10 17:50:42
14.252.138.15 attack
Automatic report - Port Scan Attack
2019-08-10 18:18:37
50.118.255.5 attack
" "
2019-08-10 17:18:38
106.13.23.77 attackbotsspam
Automatic report - Banned IP Access
2019-08-10 17:32:48
217.112.128.169 attackbots
Postfix DNSBL listed. Trying to send SPAM.
2019-08-10 17:15:20
18.179.194.99 attackbotsspam
$f2bV_matches
2019-08-10 18:21:57
148.72.214.18 attack
Aug 10 11:01:03 MK-Soft-Root1 sshd\[16522\]: Invalid user admin from 148.72.214.18 port 42447
Aug 10 11:01:03 MK-Soft-Root1 sshd\[16522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
Aug 10 11:01:05 MK-Soft-Root1 sshd\[16522\]: Failed password for invalid user admin from 148.72.214.18 port 42447 ssh2
...
2019-08-10 17:26:19
116.31.116.2 attackspam
2019-08-10T08:20:33.373029abusebot-4.cloudsearch.cf sshd\[19661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.31.116.2  user=root
2019-08-10 17:29:11
220.132.106.6 attackbots
port scan and connect, tcp 81 (hosts2-ns)
2019-08-10 18:11:14
201.116.12.217 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-08-10 18:04:47

Recently Reported IPs

68.209.171.80 204.47.74.63 223.70.31.54 112.133.236.152
100.228.61.127 88.248.188.251 145.100.214.15 60.24.212.197
99.11.191.20 40.130.216.106 125.166.117.145 117.254.51.2
202.251.237.233 131.147.62.32 69.246.35.162 105.43.112.48
112.133.243.226 18.204.195.55 82.227.105.182 191.30.120.145