Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Marburg

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.248.89.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57301
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.248.89.117.			IN	A

;; AUTHORITY SECTION:
.			238	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011300 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 15:28:56 CST 2022
;; MSG SIZE  rcvd: 107
Host info
117.89.248.137.in-addr.arpa domain name pointer vvpn417.verwaltung.uni-marburg.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.89.248.137.in-addr.arpa	name = vvpn417.verwaltung.uni-marburg.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.49.157.107 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-17 20:31:27
162.223.89.190 attack
Jul 17 15:14:39 hosting sshd[6485]: Invalid user docker from 162.223.89.190 port 52544
...
2020-07-17 20:55:18
222.186.30.57 attackbotsspam
Jul 17 12:41:13 rush sshd[2728]: Failed password for root from 222.186.30.57 port 23301 ssh2
Jul 17 12:41:41 rush sshd[2732]: Failed password for root from 222.186.30.57 port 40682 ssh2
...
2020-07-17 20:42:09
77.220.215.139 attack
Automatic report - Port Scan Attack
2020-07-17 21:03:31
179.188.7.22 attack
From bounce-35cd4d53be0cb40ec1d4b79cbb1257a1@smtplw-13.com Fri Jul 17 09:14:54 2020
Received: from smtp74t7f22.saaspmta0001.correio.biz ([179.188.7.22]:43809)
2020-07-17 20:38:46
198.188.61.254 attackspambots
Brute forcing RDP port 3389
2020-07-17 20:41:15
198.199.94.50 attack
Port probing on unauthorized port 3306
2020-07-17 20:54:56
122.117.118.87 attackbots
2 more HTTP hits without headers : 1 with length 14, 1 with length 4
2020-07-17 21:06:00
93.64.5.34 attackbotsspam
Jul 17 14:48:01 meumeu sshd[860424]: Invalid user incoming from 93.64.5.34 port 31985
Jul 17 14:48:01 meumeu sshd[860424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.64.5.34 
Jul 17 14:48:01 meumeu sshd[860424]: Invalid user incoming from 93.64.5.34 port 31985
Jul 17 14:48:03 meumeu sshd[860424]: Failed password for invalid user incoming from 93.64.5.34 port 31985 ssh2
Jul 17 14:51:06 meumeu sshd[860786]: Invalid user xxl from 93.64.5.34 port 39955
Jul 17 14:51:06 meumeu sshd[860786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.64.5.34 
Jul 17 14:51:06 meumeu sshd[860786]: Invalid user xxl from 93.64.5.34 port 39955
Jul 17 14:51:08 meumeu sshd[860786]: Failed password for invalid user xxl from 93.64.5.34 port 39955 ssh2
Jul 17 14:54:14 meumeu sshd[861040]: Invalid user oracle from 93.64.5.34 port 47361
...
2020-07-17 20:57:27
101.96.143.79 attackspam
Jul 17 14:09:50 DAAP sshd[22270]: Invalid user yuan from 101.96.143.79 port 36729
Jul 17 14:09:50 DAAP sshd[22270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.96.143.79
Jul 17 14:09:50 DAAP sshd[22270]: Invalid user yuan from 101.96.143.79 port 36729
Jul 17 14:09:52 DAAP sshd[22270]: Failed password for invalid user yuan from 101.96.143.79 port 36729 ssh2
Jul 17 14:14:57 DAAP sshd[22376]: Invalid user muddu from 101.96.143.79 port 63684
...
2020-07-17 20:34:52
78.166.226.18 attackbotsspam
Automatic report - Port Scan Attack
2020-07-17 20:57:46
103.216.188.130 attackspam
Automatic report - XMLRPC Attack
2020-07-17 20:42:25
118.69.71.182 attack
Jul 17 12:14:45 *** sshd[14089]: Invalid user bsr from 118.69.71.182
2020-07-17 20:44:44
60.167.177.27 attackspambots
Jul 17 14:14:42 raspberrypi sshd[8666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.177.27 
Jul 17 14:14:44 raspberrypi sshd[8666]: Failed password for invalid user debian from 60.167.177.27 port 43736 ssh2
...
2020-07-17 20:49:12
216.189.52.161 attack
Jul 17 14:32:50 haigwepa sshd[8893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.189.52.161 
Jul 17 14:32:52 haigwepa sshd[8893]: Failed password for invalid user hdfs from 216.189.52.161 port 52531 ssh2
...
2020-07-17 20:46:07

Recently Reported IPs

21.131.185.52 216.34.98.133 40.234.181.176 46.64.144.6
14.64.48.149 219.19.246.89 110.224.192.162 108.14.29.82
196.39.163.113 235.172.36.59 159.61.194.166 233.227.155.46
94.128.232.9 191.119.139.197 121.12.175.74 76.168.85.129
64.207.139.102 175.208.111.55 248.251.156.235 219.143.145.6