Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.144.53.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;166.144.53.89.			IN	A

;; AUTHORITY SECTION:
.			241	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032901 1800 900 604800 86400

;; Query time: 162 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 05:00:25 CST 2020
;; MSG SIZE  rcvd: 117
Host info
89.53.144.166.in-addr.arpa domain name pointer 89.sub-166-144-53.myvzw.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
89.53.144.166.in-addr.arpa	name = 89.sub-166-144-53.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.10.66.68 attackspam
Unauthorized connection attempt from IP address 103.10.66.68 on Port 445(SMB)
2020-03-11 11:08:58
186.154.213.42 attackbotsspam
Unauthorized connection attempt from IP address 186.154.213.42 on Port 445(SMB)
2020-03-11 10:46:17
180.76.246.149 attackbots
Mar 11 03:15:51 [host] sshd[29626]: Invalid user v
Mar 11 03:15:51 [host] sshd[29626]: pam_unix(sshd:
Mar 11 03:15:53 [host] sshd[29626]: Failed passwor
2020-03-11 10:52:06
221.164.220.151 attackspambots
20/3/10@22:16:02: FAIL: IoT-Telnet address from=221.164.220.151
...
2020-03-11 10:41:47
218.78.46.81 attackbots
Mar 11 03:07:40 ovpn sshd\[3922\]: Invalid user pramod from 218.78.46.81
Mar 11 03:07:40 ovpn sshd\[3922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81
Mar 11 03:07:41 ovpn sshd\[3922\]: Failed password for invalid user pramod from 218.78.46.81 port 40156 ssh2
Mar 11 03:15:47 ovpn sshd\[5799\]: Invalid user master from 218.78.46.81
Mar 11 03:15:47 ovpn sshd\[5799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81
2020-03-11 10:58:31
118.172.48.100 attackbots
Unauthorized connection attempt from IP address 118.172.48.100 on Port 445(SMB)
2020-03-11 10:42:08
27.68.131.78 attackspambots
Mar 11 03:15:55 srv206 sshd[10813]: Invalid user 666666 from 27.68.131.78
Mar 11 03:15:55 srv206 sshd[10813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.68.131.78
Mar 11 03:15:55 srv206 sshd[10813]: Invalid user 666666 from 27.68.131.78
Mar 11 03:15:58 srv206 sshd[10813]: Failed password for invalid user 666666 from 27.68.131.78 port 25497 ssh2
...
2020-03-11 10:49:38
139.99.105.138 attackbots
Mar 11 03:11:04 [snip] sshd[3878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138  user=root
Mar 11 03:11:05 [snip] sshd[3878]: Failed password for root from 139.99.105.138 port 46950 ssh2
Mar 11 03:16:04 [snip] sshd[4482]: Invalid user user from 139.99.105.138 port 35164[...]
2020-03-11 10:38:29
49.235.46.18 attack
Mar 11 03:12:06 meumeu sshd[12159]: Failed password for root from 49.235.46.18 port 55704 ssh2
Mar 11 03:13:31 meumeu sshd[12366]: Failed password for root from 49.235.46.18 port 43212 ssh2
...
2020-03-11 10:39:30
171.224.179.152 attack
Observed brute-forces/probes into wordpress endpoints
2020-03-11 10:55:31
180.244.28.28 attackspam
Unauthorized connection attempt from IP address 180.244.28.28 on Port 445(SMB)
2020-03-11 11:13:29
88.247.193.208 attack
Unauthorized connection attempt from IP address 88.247.193.208 on Port 445(SMB)
2020-03-11 10:35:54
49.234.52.176 attackspam
Mar 11 03:09:05 vpn01 sshd[6580]: Failed password for root from 49.234.52.176 port 56194 ssh2
...
2020-03-11 10:47:00
42.112.20.32 attackspam
Mar 10 23:07:59 NPSTNNYC01T sshd[27439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.112.20.32
Mar 10 23:08:01 NPSTNNYC01T sshd[27439]: Failed password for invalid user bing from 42.112.20.32 port 35750 ssh2
Mar 10 23:12:12 NPSTNNYC01T sshd[27623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.112.20.32
...
2020-03-11 11:14:55
50.58.119.70 attackspam
Scan detected 2020.03.11 03:15:58 blocked until 2020.04.05 00:47:21
2020-03-11 10:49:17

Recently Reported IPs

37.59.37.14 187.0.254.111 68.183.35.255 179.193.32.199
176.58.231.169 1.126.244.134 50.254.227.37 119.86.149.241
47.107.254.159 90.95.40.43 27.65.103.141 119.229.230.221
203.192.200.203 73.134.10.210 101.164.14.42 165.22.11.101
54.173.36.82 52.222.121.235 50.224.242.103 72.234.186.41