Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Moorhead

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.129.89.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58903
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.129.89.37.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112601 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 26 21:20:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 37.89.129.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 37.89.129.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.230.244.147 attack
SSH Brute-Forcing (server2)
2020-07-08 20:04:26
104.131.189.4 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 96 - port: 2335 proto: TCP cat: Misc Attack
2020-07-08 20:27:05
46.101.146.121 attackbots
25087/tcp 20441/tcp 23061/tcp...
[2020-06-22/07-08]54pkt,19pt.(tcp)
2020-07-08 20:15:01
106.12.176.2 attackbotsspam
Jul  8 13:48:33 backup sshd[14392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.2 
Jul  8 13:48:35 backup sshd[14392]: Failed password for invalid user gituser from 106.12.176.2 port 43752 ssh2
...
2020-07-08 20:21:21
154.92.18.55 attackbotsspam
2020-07-08T11:45:15.995933abusebot-7.cloudsearch.cf sshd[27968]: Invalid user kristin from 154.92.18.55 port 39814
2020-07-08T11:45:16.000614abusebot-7.cloudsearch.cf sshd[27968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.18.55
2020-07-08T11:45:15.995933abusebot-7.cloudsearch.cf sshd[27968]: Invalid user kristin from 154.92.18.55 port 39814
2020-07-08T11:45:18.094824abusebot-7.cloudsearch.cf sshd[27968]: Failed password for invalid user kristin from 154.92.18.55 port 39814 ssh2
2020-07-08T11:48:28.187904abusebot-7.cloudsearch.cf sshd[28105]: Invalid user jiaxing from 154.92.18.55 port 37892
2020-07-08T11:48:28.191587abusebot-7.cloudsearch.cf sshd[28105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.18.55
2020-07-08T11:48:28.187904abusebot-7.cloudsearch.cf sshd[28105]: Invalid user jiaxing from 154.92.18.55 port 37892
2020-07-08T11:48:30.444527abusebot-7.cloudsearch.cf sshd[28105]: Fai
...
2020-07-08 20:28:27
192.241.226.178 attackbots
[Sat Jul 04 03:34:03 2020] - DDoS Attack From IP: 192.241.226.178 Port: 40532
2020-07-08 20:06:58
139.170.118.203 attackspambots
13357/tcp 21080/tcp 18961/tcp...
[2020-06-22/07-07]54pkt,19pt.(tcp)
2020-07-08 20:26:42
171.251.159.3 attackspambots
" "
2020-07-08 20:34:49
61.177.172.41 attackbots
Jul  8 13:59:48 server sshd[1686]: Failed none for root from 61.177.172.41 port 36356 ssh2
Jul  8 13:59:50 server sshd[1686]: Failed password for root from 61.177.172.41 port 36356 ssh2
Jul  8 13:59:55 server sshd[1686]: Failed password for root from 61.177.172.41 port 36356 ssh2
2020-07-08 20:11:18
203.172.66.227 attack
Jul  8 12:03:42 onepixel sshd[457273]: Invalid user merlene from 203.172.66.227 port 54972
Jul  8 12:03:42 onepixel sshd[457273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.66.227 
Jul  8 12:03:42 onepixel sshd[457273]: Invalid user merlene from 203.172.66.227 port 54972
Jul  8 12:03:43 onepixel sshd[457273]: Failed password for invalid user merlene from 203.172.66.227 port 54972 ssh2
Jul  8 12:07:15 onepixel sshd[459052]: Invalid user dms from 203.172.66.227 port 55780
2020-07-08 20:19:38
94.154.239.69 attackbotsspam
20 attempts against mh-misbehave-ban on sonic
2020-07-08 20:04:49
163.172.154.178 attackspambots
Jul  8 12:04:24 plex-server sshd[744216]: Invalid user rox from 163.172.154.178 port 60588
Jul  8 12:04:24 plex-server sshd[744216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.154.178 
Jul  8 12:04:24 plex-server sshd[744216]: Invalid user rox from 163.172.154.178 port 60588
Jul  8 12:04:26 plex-server sshd[744216]: Failed password for invalid user rox from 163.172.154.178 port 60588 ssh2
Jul  8 12:07:26 plex-server sshd[745284]: Invalid user trash from 163.172.154.178 port 57570
...
2020-07-08 20:11:49
192.241.224.64 attack
[Sat Jul 04 05:26:22 2020] - DDoS Attack From IP: 192.241.224.64 Port: 35324
2020-07-08 20:06:08
185.143.73.162 attackbotsspam
Jul  8 14:25:17 srv01 postfix/smtpd\[29730\]: warning: unknown\[185.143.73.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 14:25:55 srv01 postfix/smtpd\[4613\]: warning: unknown\[185.143.73.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 14:26:34 srv01 postfix/smtpd\[22520\]: warning: unknown\[185.143.73.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 14:27:14 srv01 postfix/smtpd\[22520\]: warning: unknown\[185.143.73.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 14:27:51 srv01 postfix/smtpd\[16091\]: warning: unknown\[185.143.73.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-08 20:34:33
113.190.159.121 attack
Automatic Fail2ban report - Trying login SSH
2020-07-08 20:13:41

Recently Reported IPs

160.44.163.110 194.135.112.183 134.169.73.213 122.155.174.184
95.82.119.181 2601:200:8100:afe0:e01a:6954:31f6:25b8 194.233.86.121 40.90.163.11
40.49.124.215 111.90.50.226 40.169.43.193 1.117.175.173
1.239.83.60 176.122.170.27 216.24.188.85 185.212.59.15
104.245.102.211 178.169.212.7 172.254.162.126 89.95.115.100