Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 17.89.164.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;17.89.164.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 00:28:27 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 42.164.89.17.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.164.89.17.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.37.115.106 attack
$f2bV_matches
2019-11-06 19:00:45
106.13.97.16 attackspam
Nov  6 08:23:57 vps691689 sshd[31415]: Failed password for root from 106.13.97.16 port 38824 ssh2
Nov  6 08:29:06 vps691689 sshd[31479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.97.16
...
2019-11-06 19:14:21
14.63.221.108 attackbots
2019-11-06T08:51:15.234660shield sshd\[28160\]: Invalid user Lotta from 14.63.221.108 port 36515
2019-11-06T08:51:15.239446shield sshd\[28160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.221.108
2019-11-06T08:51:17.044198shield sshd\[28160\]: Failed password for invalid user Lotta from 14.63.221.108 port 36515 ssh2
2019-11-06T08:55:51.009802shield sshd\[28813\]: Invalid user gb from 14.63.221.108 port 55686
2019-11-06T08:55:51.014390shield sshd\[28813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.221.108
2019-11-06 18:58:40
185.142.236.34 attack
185.142.236.34 was recorded 8 times by 7 hosts attempting to connect to the following ports: 6000,9191,179,12345,2222,2086,4443,1400. Incident counter (4h, 24h, all-time): 8, 34, 102
2019-11-06 18:55:33
69.16.221.104 attackspambots
2019-11-06T12:17:40.340879mail01 postfix/smtpd[30152]: warning: unknown[69.16.221.104]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-06T12:18:00.447921mail01 postfix/smtpd[30049]: warning: unknown[69.16.221.104]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-06T12:23:44.251151mail01 postfix/smtpd[29554]: warning: unknown[69.16.221.104]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-06 19:25:17
125.212.250.163 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-11-06 18:53:50
157.0.132.174 attackspambots
Unauthorised access (Nov  6) SRC=157.0.132.174 LEN=48 TTL=48 ID=19051 DF TCP DPT=1433 WINDOW=8192 SYN
2019-11-06 19:01:28
177.73.8.230 attackspambots
Absender hat Spam-Falle ausgel?st
2019-11-06 18:50:56
159.203.189.152 attack
2019-11-06T09:22:22.197252abusebot-5.cloudsearch.cf sshd\[5709\]: Invalid user default from 159.203.189.152 port 54068
2019-11-06 19:08:00
218.17.185.45 attack
Nov  6 11:08:57 vps647732 sshd[6811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.17.185.45
Nov  6 11:08:59 vps647732 sshd[6811]: Failed password for invalid user liao198286&*mxymx from 218.17.185.45 port 56352 ssh2
...
2019-11-06 19:03:29
107.173.145.219 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: 107-173-145-219-host.colocrossing.com.
2019-11-06 19:08:25
139.199.204.61 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-11-06 19:15:12
185.222.57.76 attackbots
Nov  4 12:39:54 our-server-hostname postfix/smtpd[6225]: connect from unknown[185.222.57.76]
Nov x@x
Nov  4 12:39:56 our-server-hostname postfix/smtpd[6225]: disconnect from unknown[185.222.57.76]
Nov  4 12:41:21 our-server-hostname postfix/smtpd[6225]: connect from unknown[185.222.57.76]
Nov x@x
Nov  4 12:41:22 our-server-hostname postfix/smtpd[6225]: disconnect from unknown[185.222.57.76]
Nov  4 12:42:34 our-server-hostname postfix/smtpd[32684]: connect from unknown[185.222.57.76]
Nov x@x
Nov  4 12:42:36 our-server-hostname postfix/smtpd[32684]: disconnect from unknown[185.222.57.76]
Nov  4 12:42:38 our-server-hostname postfix/smtpd[32381]: connect from unknown[185.222.57.76]
Nov x@x
Nov  4 12:42:39 our-server-hostname postfix/smtpd[32381]: disconnect from unknown[185.222.57.76]
Nov  4 12:44:22 our-server-hostname postfix/smtpd[32040]: connect from unknown[185.222.57.76]
Nov x@x
Nov  4 12:44:23 our-server-hostname postfix/smtpd[32040]: disconnect from unknown[185.222.........
-------------------------------
2019-11-06 18:53:29
106.52.174.139 attack
Nov  6 07:20:47 legacy sshd[18298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.174.139
Nov  6 07:20:49 legacy sshd[18298]: Failed password for invalid user upload from 106.52.174.139 port 38164 ssh2
Nov  6 07:24:25 legacy sshd[18408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.174.139
...
2019-11-06 19:19:56
104.244.78.162 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-06 18:51:46

Recently Reported IPs

54.36.159.89 227.117.225.146 228.26.168.165 28.231.215.179
66.226.49.193 252.113.233.203 253.36.36.221 241.252.51.7
164.48.97.108 140.76.192.37 135.69.71.130 66.93.253.123
127.6.124.236 162.217.202.188 184.153.111.175 19.141.237.33
245.251.36.116 226.63.105.23 60.246.19.133 88.122.50.255