Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ljubljana

Region: Ljubljana

Country: Slovenia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.142.91.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41614
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.142.91.244.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121901 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 20 04:36:18 CST 2025
;; MSG SIZE  rcvd: 106
Host info
244.91.142.89.in-addr.arpa domain name pointer BSN-142-91-244.dynamic.siol.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.91.142.89.in-addr.arpa	name = BSN-142-91-244.dynamic.siol.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
217.61.122.160 attackspam
SSHAttack
2019-10-30 21:46:54
82.209.86.184 attack
Chat Spam
2019-10-30 21:19:18
2600:3c00::f03c:92ff:fedb:4563 attackbots
8000/tcp 55553/tcp 10134/tcp...
[2019-10-11/29]17pkt,16pt.(tcp)
2019-10-30 21:27:30
177.135.184.69 attackbots
Oct 30 12:53:54 ns381471 sshd[10570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.135.184.69
Oct 30 12:53:56 ns381471 sshd[10570]: Failed password for invalid user sniffer from 177.135.184.69 port 57402 ssh2
2019-10-30 21:32:54
62.162.103.206 attack
Automatic report - Banned IP Access
2019-10-30 21:40:45
61.10.2.39 attack
1433/tcp 445/tcp...
[2019-10-15/30]7pkt,2pt.(tcp)
2019-10-30 21:31:03
45.82.153.76 attack
2019-10-30T14:29:22.201715mail01 postfix/smtpd[23518]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-30T14:29:44.139175mail01 postfix/smtpd[20447]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-30T14:30:18.118767mail01 postfix/smtpd[24424]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-30 21:35:03
112.35.44.125 attackbots
Oct 30 14:17:29 lnxded64 sshd[18210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.44.125
2019-10-30 21:58:18
118.96.87.19 attackbotsspam
445/tcp
[2019-10-30]1pkt
2019-10-30 21:53:21
171.234.152.244 attackbotsspam
445/tcp 445/tcp
[2019-10-28]2pkt
2019-10-30 21:38:53
46.175.243.9 attackspambots
Oct 30 14:29:22 vps691689 sshd[12549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.175.243.9
Oct 30 14:29:24 vps691689 sshd[12549]: Failed password for invalid user password from 46.175.243.9 port 34676 ssh2
...
2019-10-30 21:43:06
179.187.159.56 attack
Oct 30 11:53:55 *** sshd[7582]: User root from 179.187.159.56 not allowed because not listed in AllowUsers
2019-10-30 21:32:28
27.12.39.116 attack
60001/tcp
[2019-10-30]1pkt
2019-10-30 21:54:30
187.104.5.92 attackbots
2019-10-30T11:54:03.592971Z a3e7bf3c9042 New connection: 187.104.5.92:52638 (172.17.0.3:2222) [session: a3e7bf3c9042]
2019-10-30T11:54:03.632514Z dcfcc8f3dd86 New connection: 187.104.5.92:53326 (172.17.0.3:2222) [session: dcfcc8f3dd86]
2019-10-30 21:24:59
1.172.11.78 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-30 21:40:58

Recently Reported IPs

96.22.57.138 207.39.52.160 138.91.72.243 128.155.9.155
216.202.153.154 241.111.213.67 77.107.150.136 70.45.179.212
21.207.200.124 160.125.142.39 217.5.240.46 54.144.55.137
133.167.84.32 19.16.118.244 25.19.215.27 108.201.162.162
4.255.102.111 145.182.146.20 144.40.17.247 37.90.183.48