Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Salvador

Region: Bahia

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: ITS TELECOMUNICAÇÕES LTDA

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.89.168.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52631
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;189.89.168.130.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060601 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jun 07 04:16:40 CST 2019
;; MSG SIZE  rcvd: 118

Host info
130.168.89.189.in-addr.arpa domain name pointer 189-89-168-130.STATIC.itsweb.com.br.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
130.168.89.189.in-addr.arpa	name = 189-89-168-130.STATIC.itsweb.com.br.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
46.105.29.160 attack
Aug  7 07:14:23 piServer sshd[26156]: Failed password for root from 46.105.29.160 port 41234 ssh2
Aug  7 07:17:17 piServer sshd[26526]: Failed password for root from 46.105.29.160 port 60048 ssh2
...
2020-08-07 14:48:41
112.134.191.75 attack
Unauthorized connection attempt detected from IP address 112.134.191.75 to port 445
2020-08-07 14:32:53
138.201.5.129 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: static.129.5.201.138.clients.your-server.de.
2020-08-07 14:31:50
123.124.87.250 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-07 14:58:46
218.92.0.173 attack
[MK-Root1] SSH login failed
2020-08-07 14:49:51
178.128.59.146 attackspam
Aug  7 08:13:09 vps639187 sshd\[16527\]: Invalid user ntps from 178.128.59.146 port 40254
Aug  7 08:13:09 vps639187 sshd\[16527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.59.146
Aug  7 08:13:11 vps639187 sshd\[16527\]: Failed password for invalid user ntps from 178.128.59.146 port 40254 ssh2
...
2020-08-07 14:18:52
89.34.27.59 attack
/wp-config.php.save
2020-08-07 14:46:36
178.21.164.90 attackbots
SSH Bruteforce Attempt on Honeypot
2020-08-07 14:56:14
188.226.236.50 attackspambots
Hit honeypot r.
2020-08-07 14:54:11
222.175.53.214 attack
Unauthorised access (Aug  7) SRC=222.175.53.214 LEN=52 TTL=111 ID=8499 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Aug  3) SRC=222.175.53.214 LEN=40 TTL=240 ID=4849 TCP DPT=445 WINDOW=2048 SYN
2020-08-07 14:20:42
129.204.177.177 attackspam
k+ssh-bruteforce
2020-08-07 14:48:21
222.186.42.213 attackspambots
Aug  7 11:50:09 gw1 sshd[18597]: Failed password for root from 222.186.42.213 port 56486 ssh2
...
2020-08-07 14:52:23
180.190.50.68 attack
Attempts to probe web pages for vulnerable PHP or other applications
2020-08-07 14:50:27
152.32.70.43 attackbots
CMS (WordPress or Joomla) login attempt.
2020-08-07 14:23:36
185.220.101.19 attackbots
Unauthorized connection attempt detected from IP address 185.220.101.19 to port 4000
2020-08-07 14:43:45

Recently Reported IPs

69.174.236.215 183.54.85.102 60.174.4.115 145.124.86.243
71.125.225.245 76.212.252.22 106.107.241.168 37.49.225.9
53.49.140.151 82.147.102.46 139.18.128.200 190.163.127.54
2.50.233.35 1.129.45.158 72.19.192.199 91.49.40.43
184.173.51.152 183.165.28.36 5.200.78.180 193.151.3.100