Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bodø

Region: Nordland

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.162.111.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.162.111.99.			IN	A

;; AUTHORITY SECTION:
.			344	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032500 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 25 19:59:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'99.111.162.89.in-addr.arpa domain name pointer 89-162-111-99.fiber.signal.no.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.111.162.89.in-addr.arpa	name = 89-162-111-99.fiber.signal.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
142.93.73.124 attackbots
[2020-04-29 05:18:26] NOTICE[1170][C-00008022] chan_sip.c: Call from '' (142.93.73.124:57119) to extension '10046462607543' rejected because extension not found in context 'public'.
[2020-04-29 05:18:26] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-29T05:18:26.401-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="10046462607543",SessionID="0x7f6c083b5ae8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/142.93.73.124/57119",ACLName="no_extension_match"
[2020-04-29 05:18:53] NOTICE[1170][C-00008025] chan_sip.c: Call from '' (142.93.73.124:62866) to extension '001146462607543' rejected because extension not found in context 'public'.
[2020-04-29 05:18:53] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-29T05:18:53.147-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="001146462607543",SessionID="0x7f6c086f7488",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/14
...
2020-04-29 17:29:54
89.122.131.36 attack
Automatic report - Banned IP Access
2020-04-29 17:09:09
118.25.1.48 attack
Apr 29 07:52:03 jane sshd[11517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.1.48 
Apr 29 07:52:06 jane sshd[11517]: Failed password for invalid user tomcat from 118.25.1.48 port 33706 ssh2
...
2020-04-29 17:18:34
106.12.161.86 attackbotsspam
Invalid user magna from 106.12.161.86 port 34464
2020-04-29 17:24:18
74.199.108.162 attackspam
Apr 28 23:03:35 php1 sshd\[5042\]: Invalid user suporte from 74.199.108.162
Apr 28 23:03:35 php1 sshd\[5042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.199.108.162
Apr 28 23:03:37 php1 sshd\[5042\]: Failed password for invalid user suporte from 74.199.108.162 port 53396 ssh2
Apr 28 23:07:25 php1 sshd\[6029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.199.108.162  user=root
Apr 28 23:07:27 php1 sshd\[6029\]: Failed password for root from 74.199.108.162 port 35490 ssh2
2020-04-29 17:21:14
115.68.207.164 attackbotsspam
$f2bV_matches
2020-04-29 16:58:52
190.2.211.18 attackbotsspam
SSH brute force attempt
2020-04-29 17:09:45
129.146.103.14 attackspam
Apr 29 06:21:41 srv01 sshd[7767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.103.14  user=root
Apr 29 06:21:42 srv01 sshd[7767]: Failed password for root from 129.146.103.14 port 51672 ssh2
Apr 29 06:25:28 srv01 sshd[11263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.103.14  user=root
Apr 29 06:25:29 srv01 sshd[11263]: Failed password for root from 129.146.103.14 port 35386 ssh2
Apr 29 06:29:23 srv01 sshd[23730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.103.14  user=root
Apr 29 06:29:25 srv01 sshd[23730]: Failed password for root from 129.146.103.14 port 47334 ssh2
...
2020-04-29 16:52:11
123.206.45.16 attackbotsspam
$f2bV_matches
2020-04-29 17:32:51
157.7.85.245 attack
prod3
...
2020-04-29 17:19:50
203.192.200.194 attackbotsspam
Apr 29 07:01:51 mail sshd[22831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.192.200.194
Apr 29 07:01:53 mail sshd[22831]: Failed password for invalid user pi from 203.192.200.194 port 26441 ssh2
...
2020-04-29 17:29:01
203.147.73.192 attackbots
(imapd) Failed IMAP login from 203.147.73.192 (NC/New Caledonia/host-203-147-73-192.h26.canl.nc): 1 in the last 3600 secs
2020-04-29 16:59:46
128.199.246.107 attack
Apr 29 08:29:20 home sshd[9818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.246.107
Apr 29 08:29:23 home sshd[9818]: Failed password for invalid user zrs from 128.199.246.107 port 4773 ssh2
Apr 29 08:33:55 home sshd[10551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.246.107
...
2020-04-29 16:54:48
139.155.84.213 attackbotsspam
Invalid user mailer from 139.155.84.213 port 60748
2020-04-29 17:26:02
116.112.64.98 attackspambots
Invalid user den from 116.112.64.98 port 55722
2020-04-29 17:20:22

Recently Reported IPs

139.113.157.219 52.110.234.157 246.53.100.162 53.224.171.223
105.11.152.42 174.55.176.182 108.149.155.223 179.239.188.242
200.164.252.242 208.163.81.73 232.14.177.160 119.220.161.106
92.214.32.135 168.175.95.165 80.172.190.128 241.139.10.230
129.248.182.227 241.188.231.15 249.245.106.120 89.112.97.240