Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Paris

Region: Île-de-France

Country: France

Internet Service Provider: SFR

Hostname: unknown

Organization: SFR SA

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.2.149.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47439
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;89.2.149.34.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 18 20:27:18 CST 2019
;; MSG SIZE  rcvd: 115

Host info
34.149.2.89.in-addr.arpa domain name pointer ip-34.net-89-2-149.rev.numericable.fr.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
34.149.2.89.in-addr.arpa	name = ip-34.net-89-2-149.rev.numericable.fr.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
2a00:1098:84::4 attackspambots
Mar 22 19:03:16 l03 sshd[7473]: Invalid user teyganne from 2a00:1098:84::4 port 35730
...
2020-03-23 03:52:08
109.50.251.215 attack
2020-03-22T17:52:32.231711upcloud.m0sh1x2.com sshd[28041]: Invalid user gerrit from 109.50.251.215 port 55242
2020-03-23 04:15:36
91.121.2.33 attackbots
2020-03-20 11:41:57 server sshd[62365]: Failed password for invalid user amaya from 91.121.2.33 port 60617 ssh2
2020-03-23 03:46:26
86.62.81.50 attack
Mar 22 20:52:04 ncomp sshd[10677]: Invalid user pi from 86.62.81.50
Mar 22 20:52:04 ncomp sshd[10677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.62.81.50
Mar 22 20:52:04 ncomp sshd[10677]: Invalid user pi from 86.62.81.50
Mar 22 20:52:06 ncomp sshd[10677]: Failed password for invalid user pi from 86.62.81.50 port 36218 ssh2
2020-03-23 03:47:38
58.210.82.250 attackspam
Mar 22 19:46:08 hosting sshd[32568]: Invalid user nfsd from 58.210.82.250 port 2116
...
2020-03-23 04:07:58
158.69.220.70 attackspam
Mar 22 21:25:30 lukav-desktop sshd\[26299\]: Invalid user ak from 158.69.220.70
Mar 22 21:25:30 lukav-desktop sshd\[26299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.220.70
Mar 22 21:25:33 lukav-desktop sshd\[26299\]: Failed password for invalid user ak from 158.69.220.70 port 48944 ssh2
Mar 22 21:29:39 lukav-desktop sshd\[30295\]: Invalid user xvf from 158.69.220.70
Mar 22 21:29:39 lukav-desktop sshd\[30295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.220.70
2020-03-23 03:40:03
62.210.77.54 attackspam
Mar 22 19:19:42 l03 sshd[10589]: Invalid user admin from 62.210.77.54 port 40148
...
2020-03-23 04:03:50
109.225.2.247 attack
Automatic report - Port Scan Attack
2020-03-23 04:16:16
189.18.205.81 attack
Mar 22 20:18:53 DAAP sshd[14911]: Invalid user kamal from 189.18.205.81 port 51363
Mar 22 20:18:53 DAAP sshd[14911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.18.205.81
Mar 22 20:18:53 DAAP sshd[14911]: Invalid user kamal from 189.18.205.81 port 51363
Mar 22 20:18:55 DAAP sshd[14911]: Failed password for invalid user kamal from 189.18.205.81 port 51363 ssh2
Mar 22 20:23:41 DAAP sshd[14986]: Invalid user notes from 189.18.205.81 port 53310
...
2020-03-23 04:11:05
200.194.16.191 attack
Automatic report - Port Scan
2020-03-23 04:15:21
218.92.0.168 attack
$f2bV_matches
2020-03-23 04:03:24
74.82.47.51 attackspam
" "
2020-03-23 04:14:34
89.36.210.121 attackbotsspam
SSH Login Bruteforce
2020-03-23 03:47:16
106.54.189.93 attackspam
Mar 22 20:17:00 localhost sshd\[5511\]: Invalid user kf from 106.54.189.93 port 48390
Mar 22 20:17:00 localhost sshd\[5511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.189.93
Mar 22 20:17:02 localhost sshd\[5511\]: Failed password for invalid user kf from 106.54.189.93 port 48390 ssh2
2020-03-23 03:42:40
176.113.161.120 attackbots
Automatic report - Port Scan
2020-03-23 03:57:00

Recently Reported IPs

153.90.11.170 193.56.29.19 116.226.31.50 75.61.1.199
178.115.229.173 67.182.18.40 42.102.207.207 118.7.21.148
55.42.150.80 85.73.0.90 5.139.7.124 118.184.127.88
3.104.243.238 191.211.48.209 195.222.180.14 97.174.169.43
151.57.105.145 49.207.5.212 112.92.50.69 192.23.226.54