Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Clifton

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       159.89.0.0 - 159.89.255.255
CIDR:           159.89.0.0/16
NetName:        DIGITALOCEAN-159-89-0-0
NetHandle:      NET-159-89-0-0-1
Parent:         NET159 (NET-159-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   DigitalOcean, LLC (DO-13)
RegDate:        2017-07-07
Updated:        2020-04-03
Comment:        Routing and Peering Policy can be found at https://www.as14061.net
Comment:        
Comment:        Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref:            https://rdap.arin.net/registry/ip/159.89.0.0



OrgName:        DigitalOcean, LLC
OrgId:          DO-13
Address:        105 Edgeview Drive, Suite 425
City:           Broomfield
StateProv:      CO
PostalCode:     80021
Country:        US
RegDate:        2012-05-14
Updated:        2025-04-11
Ref:            https://rdap.arin.net/registry/entity/DO-13


OrgNOCHandle: NOC32014-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-646-827-4366 
OrgNOCEmail:  noc@digitalocean.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN

OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName:   DigitalOcean Abuse
OrgAbusePhone:  +1-646-827-4366 
OrgAbuseEmail:  abuse@digitalocean.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/DIGIT19-ARIN

OrgTechHandle: NOC32014-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-646-827-4366 
OrgTechEmail:  noc@digitalocean.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.89.37.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22841
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.89.37.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020800 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 08 23:27:43 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 201.37.89.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.37.89.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.231.141.166 attackbots
Unauthorized connection attempt detected from IP address 49.231.141.166 to port 2323 [J]
2020-01-21 20:33:56
145.131.140.81 attackspam
Unauthorized connection attempt detected from IP address 145.131.140.81 to port 23 [J]
2020-01-21 20:22:26
147.158.209.210 attackbots
Unauthorized connection attempt detected from IP address 147.158.209.210 to port 8000 [J]
2020-01-21 20:21:45
117.60.85.65 attackbots
Unauthorized connection attempt detected from IP address 117.60.85.65 to port 23 [J]
2020-01-21 20:25:55
189.213.47.61 attack
Unauthorized connection attempt detected from IP address 189.213.47.61 to port 23 [J]
2020-01-21 20:44:31
2.38.132.198 attack
Unauthorized connection attempt detected from IP address 2.38.132.198 to port 80 [J]
2020-01-21 20:12:29
46.177.209.255 attack
Unauthorized connection attempt detected from IP address 46.177.209.255 to port 80 [J]
2020-01-21 20:10:31
18.209.23.54 attackspambots
Unauthorized connection attempt detected from IP address 18.209.23.54 to port 53 [J]
2020-01-21 20:11:33
176.100.103.173 attackspam
Unauthorized connection attempt detected from IP address 176.100.103.173 to port 80 [J]
2020-01-21 20:19:38
34.66.28.207 attackspam
Jan 21 11:25:09 * sshd[19610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.66.28.207
Jan 21 11:25:11 * sshd[19610]: Failed password for invalid user zls from 34.66.28.207 port 38088 ssh2
2020-01-21 20:11:11
51.15.1.127 attackspambots
Unauthorized connection attempt detected from IP address 51.15.1.127 to port 8080 [J]
2020-01-21 20:33:10
201.233.5.177 attackspambots
20/1/21@07:02:09: FAIL: Alarm-Telnet address from=201.233.5.177
...
2020-01-21 20:13:47
212.47.232.148 attackspambots
Unauthorized connection attempt detected from IP address 212.47.232.148 to port 25 [J]
2020-01-21 20:41:02
170.130.187.30 attackbotsspam
Unauthorized connection attempt detected from IP address 170.130.187.30 to port 8444 [J]
2020-01-21 20:46:07
46.201.215.109 attackbots
Unauthorized connection attempt detected from IP address 46.201.215.109 to port 23 [J]
2020-01-21 20:34:56

Recently Reported IPs

117.149.139.29 34.79.124.224 103.160.197.241 27.46.75.22
117.136.57.78 47.92.238.92 82.21.81.1 20.98.137.225
38.85.249.54 206.189.239.132 82.147.85.190 185.102.115.6
115.45.42.107 3.101.120.112 149.40.54.58 2408:8215:5135:2940:de73:85ff:fe56:6cf4
16.144.17.106 172.213.144.187 240e:473:3680:5042:1890:5874:5c32:1032 13.220.80.123