Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.8.185.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33671
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.8.185.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 14:57:13 CST 2025
;; MSG SIZE  rcvd: 104
Host info
20.185.8.89.in-addr.arpa domain name pointer telia-5908b9-20.connect.netcom.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.185.8.89.in-addr.arpa	name = telia-5908b9-20.connect.netcom.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.212 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
Failed password for root from 222.186.175.212 port 20452 ssh2
Failed password for root from 222.186.175.212 port 20452 ssh2
Failed password for root from 222.186.175.212 port 20452 ssh2
Failed password for root from 222.186.175.212 port 20452 ssh2
2020-02-16 22:58:28
183.81.113.138 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:25.
2020-02-16 22:45:28
184.22.208.197 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:25.
2020-02-16 22:45:03
124.83.111.107 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:20.
2020-02-16 22:55:23
112.207.36.37 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:18.
2020-02-16 22:59:59
129.211.125.143 attackbotsspam
Feb 16 15:56:53 mout sshd[17878]: Invalid user tatiana from 129.211.125.143 port 54838
2020-02-16 23:10:31
79.220.20.37 attack
Automatic report - Port Scan Attack
2020-02-16 23:26:45
105.112.181.24 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:16.
2020-02-16 23:03:08
185.113.209.115 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 23:05:48
138.0.55.194 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:21.
2020-02-16 22:52:12
120.43.101.147 attack
"SERVER-WEBAPP Netgear DGN1000 series routers arbitrary command execution attempt"
2020-02-16 23:22:13
202.151.30.145 attack
Feb 16 16:02:34 dedicated sshd[3414]: Invalid user a from 202.151.30.145 port 57938
2020-02-16 23:16:13
134.19.151.204 attackspam
port scan and connect, tcp 23 (telnet)
2020-02-16 23:13:56
221.144.61.3 attackspambots
$f2bV_matches
2020-02-16 22:59:01
185.209.0.32 attackspam
firewall-block, port(s): 6450/tcp, 10389/tcp
2020-02-16 23:09:27

Recently Reported IPs

9.133.195.255 73.152.0.69 32.61.81.229 61.8.218.223
202.241.186.0 3.244.155.229 16.53.96.121 122.200.242.243
168.180.155.228 33.71.75.125 185.6.221.111 51.221.9.203
83.34.119.140 35.170.87.98 229.64.126.252 185.231.228.179
213.107.112.165 66.220.149.33 58.179.195.249 52.136.255.12