Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.214.94.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.214.94.209.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 147 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 18:15:29 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 209.94.214.89.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 209.94.214.89.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.29.164.164 attackbots
Unauthorized connection attempt from IP address 196.29.164.164 on Port 445(SMB)
2020-03-23 00:41:22
213.25.135.253 attackspam
Honeypot Attack, Port 23
2020-03-22 23:59:37
58.245.65.143 attackbots
Honeypot attack, port: 81, PTR: 143.65.245.58.adsl-pool.jlccptt.net.cn.
2020-03-23 00:22:59
195.214.223.84 attackspambots
Mar 22 14:34:02 XXXXXX sshd[49368]: Invalid user mapred from 195.214.223.84 port 41256
2020-03-23 00:09:20
178.207.205.134 attackspam
Unauthorized connection attempt from IP address 178.207.205.134 on Port 445(SMB)
2020-03-23 00:37:43
109.226.187.30 attack
Automatic report - Port Scan Attack
2020-03-23 00:29:48
194.28.69.193 attackspambots
Unauthorized connection attempt from IP address 194.28.69.193 on Port 445(SMB)
2020-03-22 23:46:48
27.74.250.151 attack
Unauthorized connection attempt from IP address 27.74.250.151 on Port 445(SMB)
2020-03-23 00:21:37
185.176.27.246 attackspam
Mar 22 16:36:02 debian-2gb-nbg1-2 kernel: \[7150454.712418\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.246 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=40057 PROTO=TCP SPT=40162 DPT=22410 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-23 00:42:33
1.214.220.227 attackbots
SSH Bruteforce attack
2020-03-23 00:08:05
49.158.159.146 attackspam
Unauthorized connection attempt from IP address 49.158.159.146 on Port 445(SMB)
2020-03-22 23:51:43
171.246.85.138 attackbotsspam
Honeypot attack, port: 5555, PTR: dynamic-ip-adsl.viettel.vn.
2020-03-22 23:51:21
176.195.42.178 attack
Honeypot attack, port: 445, PTR: ip-176-195-42-178.bb.netbynet.ru.
2020-03-23 00:00:57
185.200.118.42 attack
Port scan: Attack repeated for 24 hours
2020-03-23 00:40:23
101.101.242.135 attackspambots
FTP/21 MH Probe, BF, Hack -
2020-03-22 23:53:59

Recently Reported IPs

177.40.172.227 77.143.94.124 67.192.4.99 148.248.140.81
203.232.35.241 86.89.233.7 50.156.212.143 173.160.15.69
251.117.92.179 150.212.135.53 149.228.47.228 119.23.244.158
186.51.172.95 57.210.134.61 144.227.2.1 132.241.79.203
33.62.224.170 189.186.161.73 65.63.0.56 101.144.58.48