Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.68.80.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6910
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.68.80.89.			IN	A

;; AUTHORITY SECTION:
.			218	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032001 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 21 10:10:16 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 89.80.68.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.80.68.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
197.49.146.202 attackspambots
2020-06-29 13:03:58,161 fail2ban.filter         [2207]: INFO    [plesk-postfix] Found 197.49.146.202 - 2020-06-29 13:03:58
2020-06-29 13:03:58,162 fail2ban.filter         [2207]: INFO    [plesk-postfix] Found 197.49.146.202 - 2020-06-29 13:03:58
2020-06-29 13:03:58,487 fail2ban.filter         [2207]: INFO    [plesk-postfix] Found 197.49.146.202 - 2020-06-29 13:03:58
2020-06-29 13:03:58,488 fail2ban.filter         [2207]: INFO    [plesk-postfix] Found 197.49.146.202 - 2020-06-29 13:03:58
2020-06-29 13:03:59,440 fail2ban.filter         [2207]: INFO    [plesk-postfix] Found 197.49.146.202 - 2020-06-29 13:03:59
2020-06-29 13:03:59,441 fail2ban.filter         [2207]: INFO    [plesk-postfix] Found 197.49.146.202 - 2020-06-29 13:03:59
2020-06-29 13:04:00,427 fail2ban.filter         [2207]: INFO    [plesk-postfix] Found 197.49.146.202 - 2020-06-29 13:04:00
2020-06-29 13:04:00,429 fail2ban.filter         [2207]: INFO    [plesk-postfix] Found 197.49.146.202 - 2020-06-29 13:04:00
........
-------------------------------
2020-06-29 21:46:51
201.163.114.170 attackspam
Unauthorized connection attempt from IP address 201.163.114.170 on Port 445(SMB)
2020-06-29 21:43:11
176.9.183.143 attackbots
TCP src-port=43581   dst-port=25   Listed on   manitu-net         (138)
2020-06-29 22:27:12
188.170.193.187 attackbots
Lines containing failures of 188.170.193.187 (max 1000)
Jun 29 11:03:22 UTC__SANYALnet-Labs__cac1 sshd[11305]: Connection from 188.170.193.187 port 41699 on 64.137.179.160 port 22
Jun 29 11:03:23 UTC__SANYALnet-Labs__cac1 sshd[11305]: Did not receive identification string from 188.170.193.187 port 41699
Jun 29 11:03:26 UTC__SANYALnet-Labs__cac1 sshd[11306]: Connection from 188.170.193.187 port 18966 on 64.137.179.160 port 22
Jun 29 11:03:28 UTC__SANYALnet-Labs__cac1 sshd[11306]: Invalid user service from 188.170.193.187 port 18966
Jun 29 11:03:28 UTC__SANYALnet-Labs__cac1 sshd[11306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.193.187
Jun 29 11:03:31 UTC__SANYALnet-Labs__cac1 sshd[11306]: Failed password for invalid user service from 188.170.193.187 port 18966 ssh2
Jun 29 11:03:31 UTC__SANYALnet-Labs__cac1 sshd[11306]: Connection closed by 188.170.193.187 port 18966 [preauth]


........
-----------------------------------------------
https://www.blocklist.d
2020-06-29 21:27:50
52.163.243.76 attack
Jun 29 13:06:11 lnxmail61 postfix/smtps/smtpd[4962]: warning: unknown[52.163.243.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 29 13:06:55 lnxmail61 postfix/smtps/smtpd[31824]: warning: unknown[52.163.243.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 29 13:09:12 lnxmail61 postfix/smtps/smtpd[4962]: warning: unknown[52.163.243.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 29 13:12:59 lnxmail61 postfix/smtps/smtpd[31824]: warning: unknown[52.163.243.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 29 13:15:59 lnxmail61 postfix/smtps/smtpd[6637]: warning: unknown[52.163.243.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-06-29 21:24:06
111.72.196.86 attackspam
Jun 29 15:04:14 srv01 postfix/smtpd\[13016\]: warning: unknown\[111.72.196.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 29 15:04:26 srv01 postfix/smtpd\[13016\]: warning: unknown\[111.72.196.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 29 15:04:44 srv01 postfix/smtpd\[13016\]: warning: unknown\[111.72.196.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 29 15:05:04 srv01 postfix/smtpd\[13016\]: warning: unknown\[111.72.196.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 29 15:05:21 srv01 postfix/smtpd\[13016\]: warning: unknown\[111.72.196.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-29 21:36:17
112.85.42.200 attackspambots
prod11
...
2020-06-29 21:29:52
87.197.154.176 attackbots
Failed password for invalid user vss from 87.197.154.176 port 38944 ssh2
2020-06-29 21:42:45
138.197.213.233 attackspam
Jun 29 06:03:47 dignus sshd[20461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.213.233
Jun 29 06:03:50 dignus sshd[20461]: Failed password for invalid user jason from 138.197.213.233 port 34880 ssh2
Jun 29 06:05:50 dignus sshd[20636]: Invalid user bow from 138.197.213.233 port 39732
Jun 29 06:05:50 dignus sshd[20636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.213.233
Jun 29 06:05:52 dignus sshd[20636]: Failed password for invalid user bow from 138.197.213.233 port 39732 ssh2
...
2020-06-29 21:35:48
123.206.38.253 attackspam
Invalid user alan from 123.206.38.253 port 46742
2020-06-29 21:19:40
89.248.162.168 attack
Jun 29 15:01:46 debian-2gb-nbg1-2 kernel: \[15694349.791350\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.162.168 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=46848 PROTO=TCP SPT=53612 DPT=22390 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-29 21:07:47
177.155.36.139 attack
Automatic report - Banned IP Access
2020-06-29 21:30:54
222.186.175.212 attack
$f2bV_matches
2020-06-29 21:18:55
172.104.238.191 attackspambots
2020-06-29T13:09:13.887179shield sshd\[20745\]: Invalid user ts from 172.104.238.191 port 34958
2020-06-29T13:09:13.891466shield sshd\[20745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gljivo.blog
2020-06-29T13:09:15.681942shield sshd\[20745\]: Failed password for invalid user ts from 172.104.238.191 port 34958 ssh2
2020-06-29T13:09:42.958341shield sshd\[20781\]: Invalid user hduser from 172.104.238.191 port 60958
2020-06-29T13:09:42.961830shield sshd\[20781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gljivo.blog
2020-06-29 21:28:46
138.204.111.77 attackbotsspam
TCP src-port=42894   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (143)
2020-06-29 21:35:30

Recently Reported IPs

211.179.113.78 6.68.235.23 85.115.2.132 185.183.180.77
10.81.7.199 32.231.76.83 132.82.120.179 118.115.249.126
183.118.42.145 206.96.130.7 124.165.242.239 147.255.13.126
70.115.210.7 208.142.137.165 146.74.181.139 182.78.211.197
33.117.132.131 117.44.16.28 116.93.34.86 10.175.112.227