Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: INDOSATM2 ASN

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.59.89.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32660
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.59.89.53.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052800 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 28 19:47:00 CST 2019
;; MSG SIZE  rcvd: 116

Host info
53.89.59.114.in-addr.arpa has no PTR record
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 53.89.59.114.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
167.99.158.136 attackbots
Nov  2 01:16:06 ny01 sshd[24813]: Failed password for root from 167.99.158.136 port 47776 ssh2
Nov  2 01:20:01 ny01 sshd[25164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.158.136
Nov  2 01:20:03 ny01 sshd[25164]: Failed password for invalid user bot from 167.99.158.136 port 57428 ssh2
2019-11-02 17:08:28
36.82.101.227 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-11-02 17:19:32
200.77.186.218 attack
Autoban   200.77.186.218 AUTH/CONNECT
2019-11-02 17:11:02
94.191.9.85 attack
Oct 30 23:43:39 host sshd[7838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.9.85  user=r.r
Oct 30 23:43:41 host sshd[7838]: Failed password for r.r from 94.191.9.85 port 46420 ssh2
Oct 31 00:03:05 host sshd[9977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.9.85  user=r.r
Oct 31 00:03:07 host sshd[9977]: Failed password for r.r from 94.191.9.85 port 44892 ssh2
Oct 31 00:07:49 host sshd[18335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.9.85  user=r.r

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.191.9.85
2019-11-02 17:02:19
119.27.168.208 attack
Nov  1 20:04:53 wbs sshd\[5304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.168.208  user=root
Nov  1 20:04:55 wbs sshd\[5304\]: Failed password for root from 119.27.168.208 port 47468 ssh2
Nov  1 20:09:40 wbs sshd\[5822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.168.208  user=root
Nov  1 20:09:42 wbs sshd\[5822\]: Failed password for root from 119.27.168.208 port 55630 ssh2
Nov  1 20:14:18 wbs sshd\[6194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.168.208  user=root
2019-11-02 16:56:10
106.39.31.70 attackbotsspam
Nov  2 10:40:26 www2 sshd\[46490\]: Failed password for root from 106.39.31.70 port 37962 ssh2Nov  2 10:45:26 www2 sshd\[47030\]: Invalid user gw from 106.39.31.70Nov  2 10:45:29 www2 sshd\[47030\]: Failed password for invalid user gw from 106.39.31.70 port 45710 ssh2
...
2019-11-02 17:03:00
111.230.223.94 attack
Nov  2 04:28:37 vps sshd[11991]: Failed password for root from 111.230.223.94 port 33002 ssh2
Nov  2 04:42:07 vps sshd[12629]: Failed password for root from 111.230.223.94 port 55626 ssh2
Nov  2 04:47:02 vps sshd[12856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.223.94 
...
2019-11-02 16:54:33
159.89.169.109 attack
Oct  4 22:45:06 localhost sshd\[32236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.109  user=root
Oct  4 22:45:08 localhost sshd\[32236\]: Failed password for root from 159.89.169.109 port 48028 ssh2
Oct  4 22:58:36 localhost sshd\[32264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.109  user=root
Oct  4 22:58:38 localhost sshd\[32264\]: Failed password for root from 159.89.169.109 port 45814 ssh2
2019-11-02 17:28:01
185.162.146.45 attackspambots
Nov  2 08:33:11 serwer sshd\[1656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.162.146.45  user=root
Nov  2 08:33:13 serwer sshd\[1656\]: Failed password for root from 185.162.146.45 port 44902 ssh2
Nov  2 08:42:01 serwer sshd\[2883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.162.146.45  user=root
...
2019-11-02 16:55:41
104.236.127.247 attackspambots
Wordpress bruteforce
2019-11-02 17:24:27
212.47.246.150 attackspam
Nov  2 07:43:03 MK-Soft-VM5 sshd[21944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.246.150 
Nov  2 07:43:05 MK-Soft-VM5 sshd[21944]: Failed password for invalid user 23456 from 212.47.246.150 port 58994 ssh2
...
2019-11-02 17:27:40
222.186.52.78 attackbots
Nov  2 09:57:56 v22018076622670303 sshd\[18871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.78  user=root
Nov  2 09:57:57 v22018076622670303 sshd\[18871\]: Failed password for root from 222.186.52.78 port 43783 ssh2
Nov  2 09:58:00 v22018076622670303 sshd\[18871\]: Failed password for root from 222.186.52.78 port 43783 ssh2
...
2019-11-02 17:06:38
103.212.211.4 attackspam
Autoban   103.212.211.4 AUTH/CONNECT
2019-11-02 17:10:12
182.72.178.114 attack
Invalid user shuan from 182.72.178.114 port 33420
2019-11-02 16:59:04
112.194.138.3 attack
Fail2Ban Ban Triggered
2019-11-02 16:57:37

Recently Reported IPs

113.172.144.107 188.130.173.9 88.253.112.246 76.31.15.74
181.165.119.141 175.135.230.247 65.225.14.73 177.74.120.37
37.54.245.9 49.83.130.200 27.183.24.107 129.244.93.30
83.242.107.154 5.56.133.124 123.105.64.221 217.243.169.51
39.48.186.248 94.151.254.102 115.23.241.127 88.190.239.27