Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.89.80.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58656
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.89.80.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 22:18:23 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 48.80.89.136.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 136.89.80.48.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
93.146.12.197 attackbotsspam
Jun  4 15:55:24 vps647732 sshd[14397]: Failed password for root from 93.146.12.197 port 40732 ssh2
...
2020-06-05 01:42:22
185.202.2.57 attackspam
scan r
2020-06-05 01:47:34
176.74.218.247 attackbots
Lines containing failures of 176.74.218.247
Jun  4 13:46:41 shared07 sshd[7896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.74.218.247  user=r.r
Jun  4 13:46:43 shared07 sshd[7896]: Failed password for r.r from 176.74.218.247 port 49228 ssh2
Jun  4 13:46:43 shared07 sshd[7896]: Received disconnect from 176.74.218.247 port 49228:11: Bye Bye [preauth]
Jun  4 13:46:43 shared07 sshd[7896]: Disconnected from authenticating user r.r 176.74.218.247 port 49228 [preauth]
Jun  4 13:55:01 shared07 sshd[10263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.74.218.247  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=176.74.218.247
2020-06-05 01:15:12
198.199.115.94 attackspam
2020-06-04T16:07:56.195426  sshd[11677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.115.94  user=root
2020-06-04T16:07:57.916281  sshd[11677]: Failed password for root from 198.199.115.94 port 52422 ssh2
2020-06-04T16:11:55.099795  sshd[11732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.115.94  user=root
2020-06-04T16:11:57.297449  sshd[11732]: Failed password for root from 198.199.115.94 port 57206 ssh2
...
2020-06-05 01:37:24
91.106.137.69 attackspam
[Thu Jun 04 19:04:20.551582 2020] [:error] [pid 27765:tid 140479450683136] [client 91.106.137.69:38397] [client 91.106.137.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/phpmyadmin/"] [unique_id "XtjjRGrt5B@yVHdW6pSrqAAAALQ"]
...
2020-06-05 01:18:43
157.230.121.118 attackspambots
Jun  4 15:04:21 debian kernel: [174824.465852] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=157.230.121.118 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=4869 PROTO=TCP SPT=45667 DPT=14300 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-05 01:16:38
112.78.185.146 attackspambots
Icarus honeypot on github
2020-06-05 01:09:16
80.82.78.100 attack
" "
2020-06-05 01:28:21
197.253.9.99 attackspambots
Unauthorized connection attempt detected from IP address 197.253.9.99 to port 445
2020-06-05 01:29:09
159.203.73.181 attackbots
2020-06-04T17:21:48.789748shield sshd\[8829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=joinlincoln.org  user=root
2020-06-04T17:21:50.384712shield sshd\[8829\]: Failed password for root from 159.203.73.181 port 50235 ssh2
2020-06-04T17:25:07.428540shield sshd\[10889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=joinlincoln.org  user=root
2020-06-04T17:25:09.015885shield sshd\[10889\]: Failed password for root from 159.203.73.181 port 51841 ssh2
2020-06-04T17:28:21.781854shield sshd\[12299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=joinlincoln.org  user=root
2020-06-05 01:36:42
5.142.81.18 attack
Jun  4 14:50:02 server5 sshd[24605]: User admin from 5.142.81.18 not allowed because not listed in AllowUsers
Jun  4 14:50:02 server5 sshd[24605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.142.81.18  user=admin
Jun  4 14:50:05 server5 sshd[24605]: Failed password for invalid user admin from 5.142.81.18 port 45429 ssh2
Jun  4 14:50:05 server5 sshd[24605]: Connection closed by 5.142.81.18 port 45429 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.142.81.18
2020-06-05 01:05:07
204.48.19.178 attackbotsspam
Jun  4 13:54:30 vserver sshd\[27371\]: Failed password for root from 204.48.19.178 port 42910 ssh2Jun  4 13:57:37 vserver sshd\[27430\]: Failed password for root from 204.48.19.178 port 46728 ssh2Jun  4 14:00:48 vserver sshd\[27467\]: Failed password for root from 204.48.19.178 port 50676 ssh2Jun  4 14:04:00 vserver sshd\[27521\]: Failed password for root from 204.48.19.178 port 54494 ssh2
...
2020-06-05 01:30:24
111.229.232.87 attack
$f2bV_matches
2020-06-05 01:19:12
201.95.65.161 attack
Jun  4 15:36:01 buvik sshd[13065]: Failed password for root from 201.95.65.161 port 51748 ssh2
Jun  4 15:38:01 buvik sshd[13286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.95.65.161  user=root
Jun  4 15:38:02 buvik sshd[13286]: Failed password for root from 201.95.65.161 port 32932 ssh2
...
2020-06-05 01:40:49
176.99.11.216 attack
176.99.11.216 - - [04/Jun/2020:14:03:58 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
176.99.11.216 - - [04/Jun/2020:14:03:59 +0200] "POST /wp-login.php HTTP/1.1" 200 2031 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
176.99.11.216 - - [04/Jun/2020:14:03:59 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
176.99.11.216 - - [04/Jun/2020:14:03:59 +0200] "POST /wp-login.php HTTP/1.1" 200 2008 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
176.99.11.216 - - [04/Jun/2020:14:03:59 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
176.99.11.216 - - [04/Jun/2020:14:04:00 +0200] "POST /wp-login.php HTTP/1.1" 200 2009 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Fir
...
2020-06-05 01:30:50

Recently Reported IPs

161.198.204.89 75.151.133.42 167.13.84.136 96.174.64.171
252.215.79.226 207.204.171.98 214.16.4.221 255.28.249.88
19.123.204.233 225.40.82.59 77.4.4.53 118.91.143.181
229.156.129.109 58.182.48.167 255.36.195.250 100.83.182.98
77.57.202.24 202.187.141.204 215.155.129.127 239.207.29.64