Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Joensuu

Region: Pohjois-Karjala [Finnish] / Norra Karelen [Swedish]

Country: Finland

Internet Service Provider: Elisa

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '91.156.0.0 - 91.156.255.255'

% Abuse contact for '91.156.0.0 - 91.156.255.255' is 'abuse@elisa.fi'

inetnum:        91.156.0.0 - 91.156.255.255
netname:        ELISA-LAAJAKAISTA
descr:          Elisa Oyj
country:        FI
admin-c:        KH-RIPE
tech-c:         KH-RIPE
status:         ASSIGNED PA
mnt-by:         ELISA-MNT
created:        2008-06-12T10:57:41Z
last-modified:  2012-02-28T10:53:10Z
source:         RIPE

role:           Elisa Hostmaster
address:        Elisa Oyj
admin-c:        RJ390-RIPE
tech-c:         RJ390-RIPE
nic-hdl:        KH-RIPE
abuse-mailbox:  abuse@elisa.fi
mnt-by:         ELISA-MNT
created:        2002-05-24T07:04:09Z
last-modified:  2016-10-22T08:41:17Z
source:         RIPE # Filtered

% Information related to '91.152.0.0/13AS719'

route:          91.152.0.0/13
descr:          Elisa Oyj
origin:         AS719
mnt-by:         ELISA-MNT
created:        2006-10-03T12:43:00Z
last-modified:  2006-10-03T12:43:00Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122.1 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.156.4.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54832
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.156.4.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051501 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 06:06:16 CST 2026
;; MSG SIZE  rcvd: 104
Host info
68.4.156.91.in-addr.arpa domain name pointer 91-156-4-68.elisa-laajakaista.fi.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.4.156.91.in-addr.arpa	name = 91-156-4-68.elisa-laajakaista.fi.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.69.50.211 attackbots
badbot
2019-11-23 03:03:15
119.200.186.168 attackspam
Automatic report - Banned IP Access
2019-11-23 03:14:23
195.58.123.109 attackspam
2019-11-22T17:28:25.221210abusebot-5.cloudsearch.cf sshd\[601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host.195.58.123.109.bitcom.se  user=root
2019-11-23 03:08:37
177.103.181.201 attackbotsspam
Unauthorized connection attempt from IP address 177.103.181.201 on Port 445(SMB)
2019-11-23 03:38:19
113.178.20.175 attackbots
Unauthorized connection attempt from IP address 113.178.20.175 on Port 445(SMB)
2019-11-23 03:19:57
202.179.187.179 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-11-23 03:05:27
14.166.24.169 attackbots
Unauthorized connection attempt from IP address 14.166.24.169 on Port 445(SMB)
2019-11-23 03:10:11
222.186.175.182 attack
Nov 22 20:32:03 mail sshd[22976]: Failed password for root from 222.186.175.182 port 51716 ssh2
Nov 22 20:32:08 mail sshd[22976]: Failed password for root from 222.186.175.182 port 51716 ssh2
Nov 22 20:32:12 mail sshd[22976]: Failed password for root from 222.186.175.182 port 51716 ssh2
Nov 22 20:32:15 mail sshd[22976]: Failed password for root from 222.186.175.182 port 51716 ssh2
2019-11-23 03:35:54
200.87.27.59 attackspam
Unauthorized connection attempt from IP address 200.87.27.59 on Port 445(SMB)
2019-11-23 03:30:23
60.188.44.23 attackspam
badbot
2019-11-23 03:43:09
196.219.163.217 attackspambots
Unauthorized connection attempt from IP address 196.219.163.217 on Port 445(SMB)
2019-11-23 03:12:24
113.87.224.23 attackspambots
Unauthorized connection attempt from IP address 113.87.224.23 on Port 445(SMB)
2019-11-23 03:42:36
60.173.46.225 attackbots
badbot
2019-11-23 03:29:03
50.199.94.84 attack
$f2bV_matches
2019-11-23 03:36:44
122.245.14.8 attackbots
badbot
2019-11-23 03:17:49

Recently Reported IPs

185.247.137.250 62.105.157.143 10.11.13.145 103.116.123.199
199.223.192.141 10.248.64.132 13.78.168.43 88.151.34.254
192.109.200.145 192.71.3.222 2606:4700:10::6814:8963 88.101.166.55
2606:4700:10::ac43:1176 2606:4700:10::6814:5792 2606:4700:10::6814:5875 2606:4700:10::6814:8046
21.173.81.78 236.3.104.184 182.242.169.64 167.123.239.32