Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.89.104.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38421
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.89.104.46.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 02:49:57 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 46.104.89.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 46.104.89.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.186.86.247 attackspam
Autoban   1.186.86.247 VIRUS
2019-11-18 22:32:31
111.30.31.176 attack
Autoban   111.30.31.176 ABORTED AUTH
2019-11-18 22:39:15
1.185.186.33 attackspambots
Autoban   1.185.186.33 VIRUS
2019-11-18 22:54:02
138.197.120.219 attack
Nov 18 17:43:07 server sshd\[3766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.120.219  user=operator
Nov 18 17:43:09 server sshd\[3766\]: Failed password for operator from 138.197.120.219 port 44746 ssh2
Nov 18 17:49:07 server sshd\[5307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.120.219  user=root
Nov 18 17:49:09 server sshd\[5307\]: Failed password for root from 138.197.120.219 port 39172 ssh2
Nov 18 17:52:44 server sshd\[6437\]: Invalid user guest from 138.197.120.219
...
2019-11-18 23:03:14
124.227.196.119 attackspam
SSH bruteforce (Triggered fail2ban)
2019-11-18 22:56:00
134.19.179.243 attackbotsspam
GET /xmlrpc.php HTTP/1.1 405 60 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36
2019-11-18 22:36:33
1.248.199.2 attackspam
Autoban   1.248.199.2 AUTH/CONNECT
2019-11-18 22:32:13
69.16.221.16 attack
Autoban   69.16.221.16 AUTH/CONNECT
2019-11-18 22:49:44
113.160.186.229 attackbots
Autoban   113.160.186.229 ABORTED AUTH
2019-11-18 22:24:06
95.210.45.30 attackspam
Automatic report - Banned IP Access
2019-11-18 23:07:50
103.51.17.31 attack
Unauthorized FTP connection attempt
2019-11-18 22:48:17
109.252.166.49 attack
Autoban   109.252.166.49 ABORTED AUTH
2019-11-18 22:42:54
104.42.158.117 attack
Automatic report - Banned IP Access
2019-11-18 23:00:36
58.27.249.202 attackspambots
Unauthorised access (Nov 18) SRC=58.27.249.202 LEN=52 TTL=113 ID=23675 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-18 22:59:08
1.186.86.200 attack
Autoban   1.186.86.200 VIRUS
2019-11-18 22:44:38

Recently Reported IPs

204.106.105.222 72.29.206.69 25.236.162.177 32.156.174.125
250.86.253.94 135.89.220.60 205.65.176.76 71.226.49.113
32.239.208.125 239.199.209.86 225.86.203.33 226.37.80.189
134.251.107.98 96.59.107.52 161.224.174.123 190.165.51.252
80.155.105.172 113.251.147.52 117.135.157.199 244.147.100.117