Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.89.54.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.89.54.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 21:02:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 39.54.89.136.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 136.89.54.39.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
159.89.28.131 attackspam
Apr 18 09:36:29 server sshd\[142849\]: Invalid user ethan from 159.89.28.131
Apr 18 09:36:29 server sshd\[142849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.28.131
Apr 18 09:36:31 server sshd\[142849\]: Failed password for invalid user ethan from 159.89.28.131 port 56330 ssh2
...
2019-07-11 22:31:34
185.176.27.86 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-11 22:06:53
128.199.211.118 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-11 21:32:15
58.87.97.219 attack
Caught in portsentry honeypot
2019-07-11 21:43:01
174.138.9.132 attack
11.07.2019 14:17:38 Connection to port 653 blocked by firewall
2019-07-11 22:39:41
139.59.75.241 attackbotsspam
Jul 11 10:20:44 XXXXXX sshd[65182]: Invalid user bugzilla from 139.59.75.241 port 44088
2019-07-11 21:36:20
216.218.206.106 attackbotsspam
Port scan: Attack repeated for 24 hours
2019-07-11 22:11:22
160.218.189.181 attackbots
Apr 29 12:04:55 server sshd\[107303\]: Invalid user user3 from 160.218.189.181
Apr 29 12:04:55 server sshd\[107303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.218.189.181
Apr 29 12:04:57 server sshd\[107303\]: Failed password for invalid user user3 from 160.218.189.181 port 49592 ssh2
...
2019-07-11 22:25:12
159.89.199.216 attackbots
Jul  2 07:49:48 server sshd\[128954\]: Invalid user admin from 159.89.199.216
Jul  2 07:49:48 server sshd\[128954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.199.216
Jul  2 07:49:50 server sshd\[128954\]: Failed password for invalid user admin from 159.89.199.216 port 58294 ssh2
...
2019-07-11 22:39:07
36.92.44.202 attackspam
ssh failed login
2019-07-11 22:14:59
115.59.12.103 attack
Jul 11 08:04:04 h2177944 kernel: \[1149317.421029\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=115.59.12.103 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=15851 PROTO=TCP SPT=51783 DPT=23 WINDOW=13991 RES=0x00 SYN URGP=0 
Jul 11 08:04:09 h2177944 kernel: \[1149322.742120\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=115.59.12.103 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=15851 PROTO=TCP SPT=51783 DPT=23 WINDOW=13991 RES=0x00 SYN URGP=0 
Jul 11 08:07:30 h2177944 kernel: \[1149523.902486\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=115.59.12.103 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=15851 PROTO=TCP SPT=51783 DPT=23 WINDOW=13991 RES=0x00 SYN URGP=0 
Jul 11 08:20:46 h2177944 kernel: \[1150319.670825\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=115.59.12.103 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=15851 PROTO=TCP SPT=51783 DPT=23 WINDOW=13991 RES=0x00 SYN URGP=0 
Jul 11 08:20:53 h2177944 kernel: \[1150325.842780\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=115.59.12.103 DST=85.214.117.9 LEN=40
2019-07-11 21:44:16
107.170.237.32 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-11 21:28:57
113.176.163.41 attack
vulcan
2019-07-11 22:19:14
31.170.58.50 attackbotsspam
SMTP-sasl brute force
...
2019-07-11 21:38:59
74.73.145.47 attackspambots
Jul 11 12:43:48 OPSO sshd\[911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.73.145.47  user=root
Jul 11 12:43:50 OPSO sshd\[911\]: Failed password for root from 74.73.145.47 port 46389 ssh2
Jul 11 12:47:38 OPSO sshd\[1234\]: Invalid user minera from 74.73.145.47 port 52612
Jul 11 12:47:38 OPSO sshd\[1234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.73.145.47
Jul 11 12:47:40 OPSO sshd\[1234\]: Failed password for invalid user minera from 74.73.145.47 port 52612 ssh2
2019-07-11 22:10:13

Recently Reported IPs

226.40.69.252 189.8.254.222 207.218.182.140 87.54.20.187
142.83.84.92 85.23.21.174 214.173.10.103 213.65.9.16
169.9.212.14 252.30.188.6 163.203.132.121 238.249.247.120
242.157.224.36 56.52.88.171 59.89.228.177 206.75.183.124
87.245.127.42 139.47.114.116 90.36.125.225 199.237.191.227