Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: Telia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.9.124.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33994
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;89.9.124.92.			IN	A

;; AUTHORITY SECTION:
.			534	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120201 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 03 03:57:02 CST 2019
;; MSG SIZE  rcvd: 115
Host info
92.124.9.89.in-addr.arpa domain name pointer telia-59097c-92.connect.netcom.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
92.124.9.89.in-addr.arpa	name = telia-59097c-92.connect.netcom.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.176.11.146 attackbots
(Sep 27)  LEN=40 PREC=0x20 TTL=235 ID=11238 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 27)  LEN=40 PREC=0x20 TTL=235 ID=13962 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 27)  LEN=40 PREC=0x20 TTL=237 ID=3802 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 27)  LEN=40 PREC=0x20 TTL=237 ID=22385 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 27)  LEN=40 PREC=0x20 TTL=235 ID=64078 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 27)  LEN=40 PREC=0x20 TTL=237 ID=13886 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 27)  LEN=40 PREC=0x20 TTL=237 ID=9302 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 27)  LEN=40 PREC=0x20 TTL=235 ID=38373 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 27)  LEN=40 PREC=0x20 TTL=237 ID=260 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 27)  LEN=40 PREC=0x20 TTL=235 ID=2532 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 27)  LEN=40 PREC=0x20 TTL=235 ID=32489 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 27)  LEN=40 PREC=0x20 TTL=237 ID=38571 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 27)  LEN=40 PREC=0x20 TTL=235 ID=9094 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep...
2019-09-27 22:35:05
103.31.12.6 attackspam
Sep 27 13:36:45 h2177944 kernel: \[2460466.205170\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.31.12.6 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=80 ID=61882 DF PROTO=TCP SPT=53683 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 
Sep 27 13:53:02 h2177944 kernel: \[2461443.613646\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.31.12.6 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=56 ID=54112 DF PROTO=TCP SPT=51296 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 
Sep 27 13:54:52 h2177944 kernel: \[2461553.131748\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.31.12.6 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=52 ID=12641 DF PROTO=TCP SPT=51850 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 
Sep 27 14:06:05 h2177944 kernel: \[2462226.665988\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.31.12.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=70 ID=24623 DF PROTO=TCP SPT=64915 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 
Sep 27 14:14:19 h2177944 kernel: \[2462720.742383\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.31.12.6 DST=85.214.117.9 LEN=4
2019-09-27 21:51:41
165.22.182.168 attack
Sep 27 09:42:49 TORMINT sshd\[7254\]: Invalid user client from 165.22.182.168
Sep 27 09:42:49 TORMINT sshd\[7254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.182.168
Sep 27 09:42:51 TORMINT sshd\[7254\]: Failed password for invalid user client from 165.22.182.168 port 36956 ssh2
...
2019-09-27 21:56:23
116.203.183.59 attack
Website hacking attempt: Admin access [/admin]
2019-09-27 22:36:55
58.244.40.200 attackbotsspam
Automated reporting of FTP Brute Force
2019-09-27 22:07:03
188.131.228.31 attackspam
Sep 27 15:35:57 vps691689 sshd[13180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.228.31
Sep 27 15:35:59 vps691689 sshd[13180]: Failed password for invalid user to from 188.131.228.31 port 48674 ssh2
Sep 27 15:42:27 vps691689 sshd[13383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.228.31
...
2019-09-27 21:55:25
51.159.0.165 attack
[FriSep2715:35:03.7605382019][:error][pid4843:tid46955191375616][client51.159.0.165:51310][client51.159.0.165]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"395"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(DisableifyouwanttoallowMSIE6\)"][severity"WARNING"][hostname"bg-sa.ch"][uri"/"][unique_id"XY4QB0whv0kL8DQEigCykwAAAAM"][FriSep2715:35:04.0172072019][:error][pid4911:tid46955302553344][client51.159.0.165:52170][client51.159.0.165]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"395"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(Disableifyouwanttoallo
2019-09-27 21:54:20
106.13.58.170 attackspam
2019-09-27T17:02:01.774063tmaserv sshd\[1995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.58.170
2019-09-27T17:02:04.411128tmaserv sshd\[1995\]: Failed password for invalid user deb from 106.13.58.170 port 59690 ssh2
2019-09-27T17:13:57.952031tmaserv sshd\[2643\]: Invalid user redmin from 106.13.58.170 port 35954
2019-09-27T17:13:57.958583tmaserv sshd\[2643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.58.170
2019-09-27T17:14:00.224051tmaserv sshd\[2643\]: Failed password for invalid user redmin from 106.13.58.170 port 35954 ssh2
2019-09-27T17:20:02.945735tmaserv sshd\[3199\]: Invalid user alvin from 106.13.58.170 port 54268
...
2019-09-27 22:34:14
122.159.107.185 attack
Automated reporting of FTP Brute Force
2019-09-27 22:22:52
163.172.207.104 attack
\[2019-09-27 09:44:59\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-27T09:44:59.516-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="36011972592277524",SessionID="0x7f1e1c2bed58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/53728",ACLName="no_extension_match"
\[2019-09-27 09:49:39\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-27T09:49:39.352-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="37011972592277524",SessionID="0x7f1e1c8be8a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/62510",ACLName="no_extension_match"
\[2019-09-27 09:53:49\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-27T09:53:49.312-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="38011972592277524",SessionID="0x7f1e1c8be8a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/50768",ACL
2019-09-27 22:10:19
94.191.50.57 attack
Sep 27 08:53:41 aat-srv002 sshd[17854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.50.57
Sep 27 08:53:43 aat-srv002 sshd[17854]: Failed password for invalid user usuarios from 94.191.50.57 port 42556 ssh2
Sep 27 09:00:59 aat-srv002 sshd[18060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.50.57
Sep 27 09:01:01 aat-srv002 sshd[18060]: Failed password for invalid user andrade123 from 94.191.50.57 port 54538 ssh2
...
2019-09-27 22:14:41
106.243.162.3 attackspambots
Sep 27 02:08:39 auw2 sshd\[7075\]: Invalid user xf from 106.243.162.3
Sep 27 02:08:39 auw2 sshd\[7075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.162.3
Sep 27 02:08:41 auw2 sshd\[7075\]: Failed password for invalid user xf from 106.243.162.3 port 36546 ssh2
Sep 27 02:13:28 auw2 sshd\[7618\]: Invalid user suge from 106.243.162.3
Sep 27 02:13:28 auw2 sshd\[7618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.162.3
2019-09-27 22:24:34
139.99.221.61 attack
Sep 27 15:18:01 ns3110291 sshd\[8934\]: Invalid user user from 139.99.221.61
Sep 27 15:18:01 ns3110291 sshd\[8934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 
Sep 27 15:18:03 ns3110291 sshd\[8934\]: Failed password for invalid user user from 139.99.221.61 port 45549 ssh2
Sep 27 15:23:15 ns3110291 sshd\[9153\]: Invalid user timemachine from 139.99.221.61
Sep 27 15:23:15 ns3110291 sshd\[9153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 
...
2019-09-27 22:21:45
14.63.174.149 attack
Sep 27 13:35:24 venus sshd\[18904\]: Invalid user sinusbot from 14.63.174.149 port 55390
Sep 27 13:35:24 venus sshd\[18904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149
Sep 27 13:35:26 venus sshd\[18904\]: Failed password for invalid user sinusbot from 14.63.174.149 port 55390 ssh2
...
2019-09-27 22:03:29
223.112.99.253 attack
Automatic report - SSH Brute-Force Attack
2019-09-27 21:57:20

Recently Reported IPs

70.32.47.141 173.105.20.99 251.217.95.203 118.130.187.43
205.121.149.99 178.149.247.31 120.237.172.80 157.38.163.175
221.171.95.30 160.16.67.162 192.95.153.211 93.32.24.30
36.203.64.34 67.117.75.131 37.114.179.136 189.172.37.198
36.72.65.121 114.251.135.104 206.214.2.172 190.17.199.70