Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Helsinki

Region: Uusimaa

Country: Finland

Internet Service Provider: DNA

Hostname: unknown

Organization: DNA Oyj

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.166.55.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44596
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;89.166.55.0.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 29 00:14:16 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 0.55.166.89.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 0.55.166.89.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
51.75.78.128 attackbots
Jun  6 15:36:40 abendstille sshd\[5961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.78.128  user=root
Jun  6 15:36:42 abendstille sshd\[5961\]: Failed password for root from 51.75.78.128 port 54452 ssh2
Jun  6 15:40:17 abendstille sshd\[9863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.78.128  user=root
Jun  6 15:40:19 abendstille sshd\[9863\]: Failed password for root from 51.75.78.128 port 58358 ssh2
Jun  6 15:43:57 abendstille sshd\[13639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.78.128  user=root
...
2020-06-06 22:02:25
202.162.208.98 attackbotsspam
Automatic report - XMLRPC Attack
2020-06-06 22:13:55
222.186.173.201 attackspambots
Jun  6 15:40:49 vmi345603 sshd[28461]: Failed password for root from 222.186.173.201 port 44598 ssh2
Jun  6 15:41:01 vmi345603 sshd[28461]: Failed password for root from 222.186.173.201 port 44598 ssh2
Jun  6 15:41:01 vmi345603 sshd[28461]: error: maximum authentication attempts exceeded for root from 222.186.173.201 port 44598 ssh2 [preauth]
...
2020-06-06 21:44:50
192.144.230.221 attackbots
Jun  6 15:37:35 fhem-rasp sshd[31125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.230.221  user=root
Jun  6 15:37:37 fhem-rasp sshd[31125]: Failed password for root from 192.144.230.221 port 36084 ssh2
...
2020-06-06 22:14:36
203.75.119.14 attack
Jun  6 15:31:46 abendstille sshd\[1069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.75.119.14  user=root
Jun  6 15:31:48 abendstille sshd\[1069\]: Failed password for root from 203.75.119.14 port 43282 ssh2
Jun  6 15:33:50 abendstille sshd\[3180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.75.119.14  user=root
Jun  6 15:33:51 abendstille sshd\[3180\]: Failed password for root from 203.75.119.14 port 47810 ssh2
Jun  6 15:36:02 abendstille sshd\[5225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.75.119.14  user=root
...
2020-06-06 21:59:41
109.115.45.179 attackbots
Unauthorised access (Jun  6) SRC=109.115.45.179 LEN=52 TTL=117 ID=492 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-06 21:55:18
222.186.52.86 attackspambots
Jun  6 14:49:41 * sshd[8862]: Failed password for root from 222.186.52.86 port 47843 ssh2
Jun  6 14:50:53 * sshd[8973]: Failed password for root from 222.186.52.86 port 29181 ssh2
2020-06-06 21:45:11
123.207.97.250 attack
20 attempts against mh-ssh on cloud
2020-06-06 21:56:24
165.227.135.34 attackspambots
Tried sshing with brute force.
2020-06-06 21:54:56
163.44.150.247 attackbots
Jun  6 22:30:05 web1 sshd[16869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247  user=root
Jun  6 22:30:07 web1 sshd[16869]: Failed password for root from 163.44.150.247 port 53990 ssh2
Jun  6 22:31:45 web1 sshd[17251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247  user=root
Jun  6 22:31:47 web1 sshd[17251]: Failed password for root from 163.44.150.247 port 34081 ssh2
Jun  6 22:32:22 web1 sshd[17390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247  user=root
Jun  6 22:32:24 web1 sshd[17390]: Failed password for root from 163.44.150.247 port 37571 ssh2
Jun  6 22:32:56 web1 sshd[17512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247  user=root
Jun  6 22:32:59 web1 sshd[17512]: Failed password for root from 163.44.150.247 port 41061 ssh2
Jun  6 22:33:30 web1 sshd[17
...
2020-06-06 21:57:32
85.105.242.55 attack
DATE:2020-06-06 14:33:13, IP:85.105.242.55, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-06-06 22:06:35
129.226.59.53 attackbots
Jun  6 10:33:46 vps46666688 sshd[16575]: Failed password for root from 129.226.59.53 port 54160 ssh2
...
2020-06-06 22:12:19
180.127.108.50 attack
spam
2020-06-06 22:04:09
52.42.62.130 attackspambots
Unauthorized connection attempt detected from IP address 52.42.62.130 to port 23
2020-06-06 21:50:49
122.166.237.117 attackspambots
2020-06-06T14:29:21.049251n23.at sshd[30749]: Failed password for root from 122.166.237.117 port 43959 ssh2
2020-06-06T14:33:22.563825n23.at sshd[2440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.166.237.117  user=root
2020-06-06T14:33:24.775689n23.at sshd[2440]: Failed password for root from 122.166.237.117 port 19404 ssh2
...
2020-06-06 22:02:11

Recently Reported IPs

199.128.108.244 2001:44c8:4705:d88a:c430:3d49:4158:14b0 157.36.184.97 182.232.56.242
190.245.14.213 223.18.193.113 196.109.248.33 122.152.215.105
96.104.243.248 14.45.197.229 77.146.160.216 1.47.108.172
121.54.215.28 23.224.82.82 186.32.89.41 150.163.249.228
185.119.82.119 132.169.128.188 178.23.145.189 106.13.131.142