Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.45.116.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26242
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.45.116.89.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 20:31:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 89.116.45.137.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 89.116.45.137.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
64.227.76.189 attack
Feb 25 17:35:10 iago sshd[5994]: Invalid user fake from 64.227.76.189
Feb 25 17:35:10 iago sshd[5994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.76.189 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=64.227.76.189
2020-02-26 05:19:24
88.135.49.14 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-26 05:08:02
125.65.2.249 attack
Honeypot attack, port: 445, PTR: 249.2.65.125.broad.ls.sc.dynamic.163data.com.cn.
2020-02-26 05:22:08
14.171.134.154 attack
Automatic report - Port Scan Attack
2020-02-26 05:06:52
116.101.248.49 attackbots
445/tcp
[2020-02-25]1pkt
2020-02-26 05:24:36
51.255.132.213 attack
Feb 25 17:35:41  sshd\[16357\]: Invalid user csgoserver from 51.255.132.213Feb 25 17:35:43  sshd\[16357\]: Failed password for invalid user csgoserver from 51.255.132.213 port 40912 ssh2
...
2020-02-26 04:53:51
161.139.102.62 attackbotsspam
1582648525 - 02/25/2020 17:35:25 Host: 161.139.102.62/161.139.102.62 Port: 445 TCP Blocked
2020-02-26 05:10:20
103.35.116.82 attackbotsspam
8022/tcp
[2020-02-25]1pkt
2020-02-26 05:09:21
92.118.160.21 attack
IP: 92.118.160.21
Ports affected
    http protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS36351 SoftLayer Technologies Inc.
   Republic of Lithuania (LT)
   CIDR 92.118.160.0/23
Log Date: 25/02/2020 5:03:02 PM UTC
2020-02-26 05:21:34
89.218.244.106 attackbotsspam
81/tcp
[2020-02-25]1pkt
2020-02-26 05:22:56
197.50.216.34 attackbotsspam
23/tcp
[2020-02-25]1pkt
2020-02-26 05:13:17
59.28.26.200 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-26 05:02:08
192.241.212.150 attackbots
scan r
2020-02-26 05:18:23
222.165.251.37 attackspam
445/tcp
[2020-02-25]1pkt
2020-02-26 05:01:37
109.206.203.14 attack
RDP Bruteforce
2020-02-26 05:16:50

Recently Reported IPs

114.129.174.166 154.111.114.225 249.200.167.181 76.102.155.191
82.16.207.1 65.142.68.197 228.216.67.115 126.253.129.255
136.48.198.107 142.171.219.219 207.34.24.211 55.241.212.54
65.84.26.127 151.32.111.33 211.254.1.42 211.45.184.183
135.60.116.160 122.152.216.202 215.107.98.249 159.206.58.169