Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.68.80.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6910
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.68.80.89.			IN	A

;; AUTHORITY SECTION:
.			218	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032001 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 21 10:10:16 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 89.80.68.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.80.68.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.39.80.220 attack
Jul  7 21:00:48 ns41 sshd[29910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.80.220
Jul  7 21:00:50 ns41 sshd[29910]: Failed password for invalid user elaine from 5.39.80.220 port 50600 ssh2
Jul  7 21:03:01 ns41 sshd[29975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.80.220
2019-07-08 03:56:51
198.20.175.132 attackbots
[portscan] Port scan
2019-07-08 03:39:18
5.88.27.5 attack
Unauthorized connection attempt from IP address 5.88.27.5 on Port 445(SMB)
2019-07-08 04:01:05
125.105.50.228 attack
WordpressAttack
2019-07-08 03:47:10
189.240.58.174 attackspambots
Unauthorized connection attempt from IP address 189.240.58.174 on Port 445(SMB)
2019-07-08 03:52:54
115.178.237.83 attack
Unauthorized connection attempt from IP address 115.178.237.83 on Port 445(SMB)
2019-07-08 03:40:55
85.194.229.245 attack
C1,WP GET /wp-login.php
GET /wp-login.php
2019-07-08 04:13:50
91.236.116.89 attack
Trying to (more than 3 packets) bruteforce (not open) SSH port 22
2019-07-08 03:43:08
152.136.130.31 attack
Jul  7 13:32:07 vpn sshd[16459]: error: Received disconnect from 152.136.130.31 port 38332:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
2019-07-08 03:45:18
180.164.89.44 attackbotsspam
Unauthorized connection attempt from IP address 180.164.89.44 on Port 445(SMB)
2019-07-08 03:41:56
5.77.182.8 attackspambots
Unauthorized connection attempt from IP address 5.77.182.8 on Port 445(SMB)
2019-07-08 03:58:36
151.16.111.223 attackspam
Autoban   151.16.111.223 AUTH/CONNECT
2019-07-08 03:42:17
124.207.103.145 attackbots
[AUTOMATIC REPORT] - 25 tries in total - SSH BRUTE FORCE - IP banned
2019-07-08 04:05:28
203.110.90.195 attackspam
SSH Brute-Force reported by Fail2Ban
2019-07-08 03:34:37
113.53.125.225 attackbotsspam
Unauthorized connection attempt from IP address 113.53.125.225 on Port 445(SMB)
2019-07-08 04:16:07

Recently Reported IPs

211.179.113.78 6.68.235.23 85.115.2.132 185.183.180.77
10.81.7.199 32.231.76.83 132.82.120.179 118.115.249.126
183.118.42.145 206.96.130.7 124.165.242.239 147.255.13.126
70.115.210.7 208.142.137.165 146.74.181.139 182.78.211.197
33.117.132.131 117.44.16.28 116.93.34.86 10.175.112.227