Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '93.158.98.0 - 93.158.99.255'

% Abuse contact for '93.158.98.0 - 93.158.99.255' is 'abuse@ip-only.net'

inetnum:        93.158.98.0 - 93.158.99.255
netname:        SURFSAFE-NET
descr:          Surfsafe Ltd
country:        NO
remarks:        Send all abuse to: abuse@surfsafe.se
admin-c:        SF6000-RIPE
tech-c:         SF6000-RIPE
status:         ASSIGNED PA
mnt-by:         PORT80-MNT
created:        2010-02-13T14:50:40Z
last-modified:  2010-02-13T14:50:40Z
source:         RIPE # Filtered

role:           Surfsafe DBM
address:        Malta
abuse-mailbox:  abuse@surfsafe.se
admin-c:        SF6000-RIPE
tech-c:         SF6000-RIPE
nic-hdl:        SF6000-RIPE
mnt-by:         PORT80-MNT
created:        2010-02-13T14:49:38Z
last-modified:  2010-02-13T14:49:38Z
source:         RIPE # Filtered

% Information related to '93.158.98.0/23AS12552'

route:          93.158.98.0/23
descr:          Internet Vikings
origin:         AS12552
mnt-by:         IP-ONLY-MNT
created:        2018-03-12T08:09:18Z
last-modified:  2018-03-12T08:09:18Z
source:         RIPE

% Information related to '93.158.98.0/23AS16150'

route:          93.158.98.0/23
descr:          Surfsafe Norway
origin:         AS16150
mnt-by:         PORT80-MNT
created:        2010-02-13T14:52:50Z
last-modified:  2010-02-13T14:52:50Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.120 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.158.98.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57296
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;93.158.98.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020300 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 03 14:31:17 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 56.98.158.93.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.98.158.93.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.61.20.207 attackspambots
port
2020-03-17 02:26:08
150.109.15.69 attackspam
SMTP
2020-03-17 02:04:45
5.135.94.191 attackbotsspam
[portscan] Port scan
2020-03-17 02:35:07
175.211.105.99 attack
2020-03-16T17:26:29.906071abusebot-4.cloudsearch.cf sshd[3601]: Invalid user 22 from 175.211.105.99 port 51186
2020-03-16T17:26:29.911936abusebot-4.cloudsearch.cf sshd[3601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.211.105.99
2020-03-16T17:26:29.906071abusebot-4.cloudsearch.cf sshd[3601]: Invalid user 22 from 175.211.105.99 port 51186
2020-03-16T17:26:31.529856abusebot-4.cloudsearch.cf sshd[3601]: Failed password for invalid user 22 from 175.211.105.99 port 51186 ssh2
2020-03-16T17:32:49.146131abusebot-4.cloudsearch.cf sshd[3927]: Invalid user 22 from 175.211.105.99 port 58134
2020-03-16T17:32:49.154228abusebot-4.cloudsearch.cf sshd[3927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.211.105.99
2020-03-16T17:32:49.146131abusebot-4.cloudsearch.cf sshd[3927]: Invalid user 22 from 175.211.105.99 port 58134
2020-03-16T17:32:51.274247abusebot-4.cloudsearch.cf sshd[3927]: Failed password for in
...
2020-03-17 02:02:07
191.55.216.99 attackbots
Mar 16 15:36:32 xxxxxxx0 sshd[2012]: Invalid user admin from 191.55.216.99 port 50004
Mar 16 15:36:32 xxxxxxx0 sshd[2012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.55.216.99
Mar 16 15:36:35 xxxxxxx0 sshd[2012]: Failed password for invalid user admin from 191.55.216.99 port 50004 ssh2
Mar 16 15:36:38 xxxxxxx0 sshd[2040]: Invalid user admin from 191.55.216.99 port 50010
Mar 16 15:36:38 xxxxxxx0 sshd[2040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.55.216.99

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=191.55.216.99
2020-03-17 01:53:25
49.233.186.41 attackspam
Unauthorized SSH login attempts
2020-03-17 02:40:54
222.186.173.226 attack
2020-03-16T18:09:20.694419shield sshd\[1127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
2020-03-16T18:09:22.266879shield sshd\[1127\]: Failed password for root from 222.186.173.226 port 48401 ssh2
2020-03-16T18:09:24.858093shield sshd\[1127\]: Failed password for root from 222.186.173.226 port 48401 ssh2
2020-03-16T18:09:28.203351shield sshd\[1127\]: Failed password for root from 222.186.173.226 port 48401 ssh2
2020-03-16T18:09:31.285821shield sshd\[1127\]: Failed password for root from 222.186.173.226 port 48401 ssh2
2020-03-17 02:13:28
220.80.229.69 attackspam
Port probing on unauthorized port 23
2020-03-17 02:29:45
134.209.46.135 attack
DigitalOcean BotNet attack - 10s of requests to non-existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
node-superagent/4.1.0
2020-03-17 01:54:44
177.139.153.186 attack
Mar 16 17:48:59 legacy sshd[31063]: Failed password for root from 177.139.153.186 port 46172 ssh2
Mar 16 17:55:40 legacy sshd[31123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.153.186
Mar 16 17:55:42 legacy sshd[31123]: Failed password for invalid user mikel from 177.139.153.186 port 58486 ssh2
...
2020-03-17 02:26:26
189.164.21.175 attackbotsspam
Port probing on unauthorized port 23
2020-03-17 02:09:12
114.237.154.202 attackspam
SpamScore above: 10.0
2020-03-17 02:12:01
45.143.223.175 attackbots
2020-03-16 15:38:56 H=(WIN-CLJ1B0GQ6JP) [45.143.223.175] F=: relay not permhostnameted


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.143.223.175
2020-03-17 02:03:34
5.235.160.252 attack
Unauthorized connection attempt detected from IP address 5.235.160.252 to port 23
2020-03-17 02:28:02
187.18.108.73 attack
Mar 16 16:17:01 santamaria sshd\[5456\]: Invalid user gzx from 187.18.108.73
Mar 16 16:18:24 santamaria sshd\[5456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.18.108.73
Mar 16 16:18:26 santamaria sshd\[5456\]: Failed password for invalid user gzx from 187.18.108.73 port 60568 ssh2
...
2020-03-17 02:08:31

Recently Reported IPs

192.71.2.99 38.98.39.0 47.84.0.253 47.84.116.48
39.191.209.250 23.180.120.131 111.19.57.126 1.83.125.166
121.40.43.190 183.47.122.37 112.208.247.154 112.208.247.241
40.47.152.177 162.216.150.43 190.123.43.242 138.68.153.32
181.199.163.213 181.199.163.35 181.199.163.223 203.192.7.10