Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.48.53.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.48.53.89.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 18:06:11 CST 2025
;; MSG SIZE  rcvd: 104
Host info
89.53.48.13.in-addr.arpa domain name pointer ec2-13-48-53-89.eu-north-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
89.53.48.13.in-addr.arpa	name = ec2-13-48-53-89.eu-north-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.63.194.56 attackbots
firewall-block, port(s): 3389/tcp, 3390/tcp
2019-09-06 04:44:52
104.140.188.18 attackspam
Automatic report - Port Scan Attack
2019-09-06 04:17:57
68.183.150.254 attack
SSH Brute Force, server-1 sshd[20144]: Failed password for invalid user sinusbot from 68.183.150.254 port 51458 ssh2
2019-09-06 04:33:21
58.249.123.38 attack
Sep  5 22:36:16 mail sshd\[28378\]: Invalid user vnc from 58.249.123.38 port 54820
Sep  5 22:36:16 mail sshd\[28378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.249.123.38
Sep  5 22:36:18 mail sshd\[28378\]: Failed password for invalid user vnc from 58.249.123.38 port 54820 ssh2
Sep  5 22:40:32 mail sshd\[28907\]: Invalid user ubuntu from 58.249.123.38 port 38682
Sep  5 22:40:32 mail sshd\[28907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.249.123.38
2019-09-06 04:52:16
132.232.118.214 attackspam
Sep  5 22:07:22 vps691689 sshd[612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.118.214
Sep  5 22:07:23 vps691689 sshd[612]: Failed password for invalid user redmine from 132.232.118.214 port 37722 ssh2
...
2019-09-06 04:23:39
206.189.23.43 attack
fire
2019-09-06 04:50:26
216.244.76.218 attack
Sep  5 13:18:47 rb06 sshd[23351]: Failed password for invalid user tempuser from 216.244.76.218 port 42284 ssh2
Sep  5 13:18:47 rb06 sshd[23351]: Received disconnect from 216.244.76.218: 11: Bye Bye [preauth]
Sep  5 13:27:38 rb06 sshd[26526]: Failed password for invalid user vmadmin from 216.244.76.218 port 59248 ssh2
Sep  5 13:27:38 rb06 sshd[26526]: Received disconnect from 216.244.76.218: 11: Bye Bye [preauth]
Sep  5 13:31:56 rb06 sshd[28149]: Failed password for invalid user adminixxxr from 216.244.76.218 port 49352 ssh2
Sep  5 13:31:56 rb06 sshd[28149]: Received disconnect from 216.244.76.218: 11: Bye Bye [preauth]
Sep  5 13:36:08 rb06 sshd[30730]: Failed password for invalid user user from 216.244.76.218 port 39430 ssh2
Sep  5 13:36:09 rb06 sshd[30730]: Received disconnect from 216.244.76.218: 11: Bye Bye [preauth]
Sep  5 13:40:26 rb06 sshd[32259]: Failed password for invalid user ghostname from 216.244.76.218 port 57740 ssh2
Sep  5 13:40:26 rb06 sshd[32259]: Rece........
-------------------------------
2019-09-06 04:21:35
217.105.19.107 attackspambots
firewall-block, port(s): 23/tcp
2019-09-06 04:28:20
206.189.24.75 attackspam
fire
2019-09-06 04:50:02
185.176.27.26 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-06 04:16:52
82.85.143.181 attack
Sep  5 22:01:05 Ubuntu-1404-trusty-64-minimal sshd\[31705\]: Invalid user deploy from 82.85.143.181
Sep  5 22:01:05 Ubuntu-1404-trusty-64-minimal sshd\[31705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.85.143.181
Sep  5 22:01:07 Ubuntu-1404-trusty-64-minimal sshd\[31705\]: Failed password for invalid user deploy from 82.85.143.181 port 21849 ssh2
Sep  5 22:11:34 Ubuntu-1404-trusty-64-minimal sshd\[9638\]: Invalid user test2 from 82.85.143.181
Sep  5 22:11:34 Ubuntu-1404-trusty-64-minimal sshd\[9638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.85.143.181
2019-09-06 04:15:57
118.186.2.18 attackbotsspam
Sep  5 14:06:06 xb0 sshd[29695]: Failed password for invalid user steam from 118.186.2.18 port 36908 ssh2
Sep  5 14:06:06 xb0 sshd[29695]: Received disconnect from 118.186.2.18: 11: Bye Bye [preauth]
Sep  5 14:13:43 xb0 sshd[5898]: Failed password for invalid user ubuntu from 118.186.2.18 port 58705 ssh2
Sep  5 14:13:43 xb0 sshd[5898]: Received disconnect from 118.186.2.18: 11: Bye Bye [preauth]
Sep  5 14:17:39 xb0 sshd[3583]: Failed password for invalid user test from 118.186.2.18 port 43406 ssh2
Sep  5 14:17:39 xb0 sshd[3583]: Received disconnect from 118.186.2.18: 11: Bye Bye [preauth]
Sep  5 14:21:30 xb0 sshd[1528]: Failed password for invalid user *** from 118.186.2.18 port 56342 ssh2
Sep  5 14:21:31 xb0 sshd[1528]: Received disconnect from 118.186.2.18: 11: Bye Bye [preauth]
Sep  5 14:25:13 xb0 sshd[21913]: Failed password for invalid user student from 118.186.2.18 port 41078 ssh2
Sep  5 14:25:13 xb0 sshd[21913]: Received disconnect from 118.186.2.18: 11: Bye Bye ........
-------------------------------
2019-09-06 04:43:26
68.183.48.172 attackspam
Sep  5 10:31:20 lcprod sshd\[27804\]: Invalid user developer from 68.183.48.172
Sep  5 10:31:20 lcprod sshd\[27804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172
Sep  5 10:31:21 lcprod sshd\[27804\]: Failed password for invalid user developer from 68.183.48.172 port 41747 ssh2
Sep  5 10:35:49 lcprod sshd\[28198\]: Invalid user hduser from 68.183.48.172
Sep  5 10:35:49 lcprod sshd\[28198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172
2019-09-06 04:38:48
201.182.152.75 attackspambots
Sep  5 20:21:41 our-server-hostname postfix/smtpd[17098]: connect from unknown[201.182.152.75]
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep  5 20:21:50 our-server-hostname postfix/smtpd[17098]: lost connection after RCPT from unknown[201.182.152.75]
Sep  5 20:21:50 our-server-hostname postfix/smtpd[17098]: disconnect from unknown[201.182.152.75]
Sep  5 20:47:51 our-server-hostname postfix/smtpd[6771]: connect from unknown[201.182.152.75]
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep  5 20:47:58 our-server-hostname postfix/smtpd[6771]: lost connection after RCPT from unknown[201.182.152.75]
Sep  5 20:47:58 our-server-hostname postfix/smtpd[6771]: disconnect from unknown[201.182.152.75]
Sep  5 20:53:09 our-server-hostname postfix/smtpd[30515]: connect from unknown[201.182.152.75]
Sep x@x
Sep  5 20:53:18 our-server-hostname postfix/smtpd[30515]: lost connection after RCPT from unknown[201.182.152.75]
Sep  5 20:53:18 our-server-hostname postfix/smtpd[30515]: disconnect........
-------------------------------
2019-09-06 04:09:48
189.69.104.139 attack
Sep  5 22:14:26 vps01 sshd[30003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.69.104.139
Sep  5 22:14:27 vps01 sshd[30003]: Failed password for invalid user admin from 189.69.104.139 port 60950 ssh2
2019-09-06 04:42:18

Recently Reported IPs

86.47.145.49 196.207.244.48 69.126.49.141 181.6.195.163
55.34.77.40 172.122.93.8 4.197.201.141 204.0.0.163
144.27.176.58 120.182.189.181 242.142.164.62 62.201.92.197
4.60.0.226 203.178.14.200 141.232.103.166 41.7.32.16
232.242.155.167 126.154.217.24 223.43.253.23 25.178.63.111