Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.1.53.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.1.53.89.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022070600 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 06 23:54:53 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 89.53.1.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.53.1.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.120.90.158 attackspambots
60001/tcp
[2019-06-24]1pkt
2019-06-25 02:27:23
141.98.10.32 attackbotsspam
Rude login attack (7 tries in 1d)
2019-06-25 02:28:23
221.181.24.246 attack
Invalid user support from 221.181.24.246 port 34200
2019-06-25 03:07:22
101.89.150.230 attack
Invalid user netdump from 101.89.150.230 port 47001
2019-06-25 02:47:54
196.203.31.154 attackbotsspam
Jun 24 19:16:45 cvbmail sshd\[26839\]: Invalid user webserver from 196.203.31.154
Jun 24 19:16:45 cvbmail sshd\[26839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.203.31.154
Jun 24 19:16:47 cvbmail sshd\[26839\]: Failed password for invalid user webserver from 196.203.31.154 port 40607 ssh2
2019-06-25 03:08:59
45.227.253.211 attack
Jun 24 19:19:56 mailserver postfix/anvil[94249]: statistics: max connection rate 2/60s for (smtps:45.227.253.211) at Jun 24 19:12:48
Jun 24 20:22:20 mailserver postfix/smtps/smtpd[94992]: warning: hostname hosting-by.directwebhost.org does not resolve to address 45.227.253.211: hostname nor servname provided, or not known
Jun 24 20:22:20 mailserver postfix/smtps/smtpd[94992]: connect from unknown[45.227.253.211]
Jun 24 20:22:22 mailserver dovecot: auth-worker(94972): sql([hidden],45.227.253.211): unknown user
Jun 24 20:22:24 mailserver postfix/smtps/smtpd[94992]: warning: unknown[45.227.253.211]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 20:22:24 mailserver postfix/smtps/smtpd[94992]: lost connection after AUTH from unknown[45.227.253.211]
Jun 24 20:22:24 mailserver postfix/smtps/smtpd[94992]: disconnect from unknown[45.227.253.211]
Jun 24 20:22:24 mailserver postfix/smtps/smtpd[94992]: warning: hostname hosting-by.directwebhost.org does not resolve to address 45.227.253.211: hostname nor servname
2019-06-25 02:22:40
54.233.66.181 attackbots
fraudulent SSH attempt
2019-06-25 02:53:49
138.68.226.175 attackspam
Invalid user ntpupdate from 138.68.226.175 port 35666
2019-06-25 02:58:45
54.223.168.233 attackspambots
2019-06-24T18:22:21.079290abusebot-4.cloudsearch.cf sshd\[6909\]: Invalid user ftptest from 54.223.168.233 port 32928
2019-06-25 02:29:54
61.166.49.101 attackspam
19/6/24@07:59:39: FAIL: Alarm-Intrusion address from=61.166.49.101
19/6/24@07:59:39: FAIL: Alarm-Intrusion address from=61.166.49.101
...
2019-06-25 03:06:33
145.239.83.89 attackspambots
Invalid user rrashid from 145.239.83.89 port 52188
2019-06-25 02:34:45
106.12.194.234 attack
24.06.2019 15:53:39 SSH access blocked by firewall
2019-06-25 02:35:37
192.163.224.116 attackspam
Invalid user zong from 192.163.224.116 port 44224
2019-06-25 02:38:23
81.12.159.146 attack
Jun 24 20:10:44 bouncer sshd\[8083\]: Invalid user temp1 from 81.12.159.146 port 32782
Jun 24 20:10:44 bouncer sshd\[8083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.12.159.146 
Jun 24 20:10:46 bouncer sshd\[8083\]: Failed password for invalid user temp1 from 81.12.159.146 port 32782 ssh2
...
2019-06-25 03:03:27
45.55.12.248 attack
$f2bV_matches
2019-06-25 03:04:31

Recently Reported IPs

19.12.2.60 98.50.91.4 2.5.67.189 1.43.56.11
7.3.164.38 12.79.66.5 1.98.88.47 15.76.0.65
77.4.61.32 194.26.192.69 6.148.95.5 230.63.131.238
111.150.204.33 254.30.174.209 6.76.228.1 3.43.97.90
17.12.19.1 163.5.12.5 1.85.6.137 43.74.0.35