Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: DigitalOcean, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
159.89.111.136 attack
Invalid user redbot from 159.89.111.136 port 40858
2020-01-29 04:53:19
159.89.111.136 attack
Unauthorized connection attempt detected from IP address 159.89.111.136 to port 2220 [J]
2020-01-22 14:00:47
159.89.111.136 attackspambots
$f2bV_matches
2020-01-08 20:13:34
159.89.111.136 attackbotsspam
ssh failed login
2019-12-29 13:47:27
159.89.111.136 attackspam
Dec 15 08:53:39 meumeu sshd[3769]: Failed password for root from 159.89.111.136 port 41766 ssh2
Dec 15 08:58:46 meumeu sshd[4646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136 
Dec 15 08:58:47 meumeu sshd[4646]: Failed password for invalid user tomcat from 159.89.111.136 port 48742 ssh2
...
2019-12-15 17:52:10
159.89.111.136 attackbots
Dec  9 20:26:05 kapalua sshd\[4545\]: Invalid user charbonnel from 159.89.111.136
Dec  9 20:26:05 kapalua sshd\[4545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136
Dec  9 20:26:06 kapalua sshd\[4545\]: Failed password for invalid user charbonnel from 159.89.111.136 port 37814 ssh2
Dec  9 20:31:20 kapalua sshd\[5120\]: Invalid user foram from 159.89.111.136
Dec  9 20:31:20 kapalua sshd\[5120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136
2019-12-10 14:40:49
159.89.111.136 attackbots
Dec  9 08:49:52 home sshd[14094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136  user=root
Dec  9 08:49:53 home sshd[14094]: Failed password for root from 159.89.111.136 port 50282 ssh2
Dec  9 08:57:30 home sshd[14155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136  user=root
Dec  9 08:57:32 home sshd[14155]: Failed password for root from 159.89.111.136 port 59334 ssh2
Dec  9 09:02:38 home sshd[14207]: Invalid user jungle from 159.89.111.136 port 39148
Dec  9 09:02:38 home sshd[14207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136
Dec  9 09:02:38 home sshd[14207]: Invalid user jungle from 159.89.111.136 port 39148
Dec  9 09:02:40 home sshd[14207]: Failed password for invalid user jungle from 159.89.111.136 port 39148 ssh2
Dec  9 09:07:47 home sshd[14245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost
2019-12-10 00:42:18
159.89.111.136 attackspam
2019-12-04T22:24:34.886842stark.klein-stark.info sshd\[13146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136  user=daemon
2019-12-04T22:24:37.091534stark.klein-stark.info sshd\[13146\]: Failed password for daemon from 159.89.111.136 port 33600 ssh2
2019-12-04T22:30:22.430505stark.klein-stark.info sshd\[13573\]: Invalid user baseball from 159.89.111.136 port 50102
...
2019-12-05 06:16:09
159.89.111.136 attack
Nov 30 06:59:07 vps58358 sshd\[11658\]: Invalid user windy from 159.89.111.136Nov 30 06:59:09 vps58358 sshd\[11658\]: Failed password for invalid user windy from 159.89.111.136 port 33334 ssh2Nov 30 07:02:07 vps58358 sshd\[11663\]: Invalid user united from 159.89.111.136Nov 30 07:02:09 vps58358 sshd\[11663\]: Failed password for invalid user united from 159.89.111.136 port 39576 ssh2Nov 30 07:05:04 vps58358 sshd\[11681\]: Invalid user 123456 from 159.89.111.136Nov 30 07:05:06 vps58358 sshd\[11681\]: Failed password for invalid user 123456 from 159.89.111.136 port 45582 ssh2
...
2019-11-30 14:24:45
159.89.111.136 attack
Nov 13 15:27:31 Ubuntu-1404-trusty-64-minimal sshd\[24154\]: Invalid user server from 159.89.111.136
Nov 13 15:27:31 Ubuntu-1404-trusty-64-minimal sshd\[24154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136
Nov 13 15:27:33 Ubuntu-1404-trusty-64-minimal sshd\[24154\]: Failed password for invalid user server from 159.89.111.136 port 42566 ssh2
Nov 13 15:46:23 Ubuntu-1404-trusty-64-minimal sshd\[12241\]: Invalid user gottschalk from 159.89.111.136
Nov 13 15:46:23 Ubuntu-1404-trusty-64-minimal sshd\[12241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136
2019-11-14 03:24:51
159.89.111.136 attack
Nov  8 17:34:47 lanister sshd[1513]: Invalid user spark from 159.89.111.136
Nov  8 17:34:47 lanister sshd[1513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136
Nov  8 17:34:47 lanister sshd[1513]: Invalid user spark from 159.89.111.136
Nov  8 17:34:49 lanister sshd[1513]: Failed password for invalid user spark from 159.89.111.136 port 35592 ssh2
...
2019-11-09 08:04:47
159.89.111.136 attackbots
Nov  5 22:29:41 ip-172-31-62-245 sshd\[20985\]: Invalid user fnjoroge from 159.89.111.136\
Nov  5 22:29:43 ip-172-31-62-245 sshd\[20985\]: Failed password for invalid user fnjoroge from 159.89.111.136 port 36906 ssh2\
Nov  5 22:33:26 ip-172-31-62-245 sshd\[21001\]: Invalid user denver from 159.89.111.136\
Nov  5 22:33:27 ip-172-31-62-245 sshd\[21001\]: Failed password for invalid user denver from 159.89.111.136 port 46644 ssh2\
Nov  5 22:37:15 ip-172-31-62-245 sshd\[21026\]: Failed password for root from 159.89.111.136 port 56384 ssh2\
2019-11-06 07:52:14
159.89.111.136 attackspambots
Invalid user user04 from 159.89.111.136 port 37042
2019-10-20 03:42:27
159.89.111.136 attack
Oct 16 13:19:52 vmd17057 sshd\[32696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136  user=root
Oct 16 13:19:54 vmd17057 sshd\[32696\]: Failed password for root from 159.89.111.136 port 33996 ssh2
Oct 16 13:23:22 vmd17057 sshd\[498\]: Invalid user test from 159.89.111.136 port 44666
...
2019-10-16 21:04:16
159.89.111.136 attack
2019-10-08T17:26:47.626887shield sshd\[29595\]: Invalid user Step123 from 159.89.111.136 port 42914
2019-10-08T17:26:47.633566shield sshd\[29595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136
2019-10-08T17:26:49.625724shield sshd\[29595\]: Failed password for invalid user Step123 from 159.89.111.136 port 42914 ssh2
2019-10-08T17:30:48.418429shield sshd\[29982\]: Invalid user Living2017 from 159.89.111.136 port 53078
2019-10-08T17:30:48.424044shield sshd\[29982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136
2019-10-09 01:57:50
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.89.111.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35717
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;159.89.111.48.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041901 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 20 00:08:15 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 48.111.89.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 48.111.89.159.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
220.156.161.89 attackbotsspam
Unauthorized connection attempt from IP address 220.156.161.89 on Port 143(IMAP)
2020-08-14 18:57:27
27.78.140.132 attackspam
445/tcp
[2020-08-14]1pkt
2020-08-14 19:21:53
87.138.254.133 attack
Bruteforce detected by fail2ban
2020-08-14 19:01:41
202.207.77.2 attack
1433/tcp
[2020-08-14]1pkt
2020-08-14 19:31:23
118.67.248.16 attack
Port scan: Attack repeated for 24 hours
2020-08-14 19:33:52
34.73.15.205 attackspam
$f2bV_matches
2020-08-14 19:00:21
113.190.231.139 attackbotsspam
445/tcp 445/tcp
[2020-08-12]2pkt
2020-08-14 19:09:35
123.185.187.39 attackspambots
Unauthorized connection attempt from IP address 123.185.187.39 on Port 445(SMB)
2020-08-14 19:25:20
123.205.185.248 attackspambots
9530/tcp 8000/tcp
[2020-06-18/08-14]2pkt
2020-08-14 18:58:37
151.21.139.61 attackbots
445/tcp 445/tcp 445/tcp...
[2020-08-08/12]5pkt,1pt.(tcp)
2020-08-14 19:08:40
171.229.68.175 attackspambots
Unauthorized connection attempt from IP address 171.229.68.175 on Port 445(SMB)
2020-08-14 19:31:45
203.195.138.194 attackbots
<6 unauthorized SSH connections
2020-08-14 19:20:48
106.12.52.98 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-08-14 19:03:05
123.131.134.18 attackspambots
1433/tcp
[2020-08-14]1pkt
2020-08-14 19:14:37
125.163.56.42 attackbots
Unauthorized connection attempt from IP address 125.163.56.42 on Port 445(SMB)
2020-08-14 19:14:21

Recently Reported IPs

218.149.80.105 113.199.115.101 90.107.210.171 46.100.90.4
137.117.199.98 118.36.97.181 190.128.168.78 112.16.203.48
159.89.43.184 74.82.47.53 117.60.18.102 102.165.49.54
202.129.16.124 27.206.113.152 184.75.220.66 189.161.210.50
113.99.163.133 118.25.45.75 187.188.191.48 5.8.18.180