Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.89.161.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.89.161.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 09:39:24 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 85.161.89.55.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 55.89.161.85.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
187.125.30.122 attackspambots
445/tcp 445/tcp 445/tcp
[2020-01-15/02-23]3pkt
2020-02-24 09:43:09
189.78.114.252 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:31:18
113.178.120.104 botsattack
attack  garena account
2020-02-24 11:16:41
37.228.138.22 attack
WordPress brute force
2020-02-24 09:26:42
185.217.1.245 attackspambots
5351/udp 5351/udp 5351/udp...
[2020-02-19/23]8pkt,1pt.(udp)
2020-02-24 09:50:58
51.89.250.10 spam
X-ASG-Debug-ID: 1582512178-05f39b12762fd230001-8J236c
Received: from mail.kwpl.lk (mail.kwpl.lk [203.143.28.194]) by filter.internet.net.au with ESMTP id H5cI0AcDtjgcisWl for Mon, 24 Feb 2020 13:42:59 +1100 (AEDT)
X-Barracuda-Envelope-From: v.steenkamp@order-invoicing.com
X-Barracuda-Effective-Source-IP: mail.kwpl.lk[203.143.28.194]
X-Barracuda-Apparent-Source-IP: 203.143.28.194
Received: from [51.89.250.10] (ip10.ip-51-89-250.eu [51.89.250.10])
2020-02-24 11:11:22
190.7.139.84 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:28:16
190.141.37.170 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:24:24
188.32.108.72 attack
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:36:23
187.60.43.94 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:43:55
167.172.51.5 attackspambots
" "
2020-02-24 13:05:31
189.197.77.148 attackbots
Microsoft SQL Server User Authentication Brute Force Attempt, PTR: customer-HMO-MCA-77-148.megared.net.mx.
2020-02-24 09:29:00
103.117.118.138 attackbotsspam
Port probing on unauthorized port 81
2020-02-24 13:02:27
188.0.135.76 attack
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:37:42
190.7.155.130 attack
1582498575 - 02/23/2020 23:56:15 Host: 190.7.155.130/190.7.155.130 Port: 445 TCP Blocked
2020-02-24 09:27:44

Recently Reported IPs

207.163.180.234 177.244.190.197 176.60.78.198 25.53.231.223
45.137.190.9 207.237.59.244 163.2.17.167 7.64.232.248
201.216.136.203 239.220.184.117 161.48.118.68 66.222.97.138
3.71.236.13 45.64.129.145 251.34.226.102 132.199.235.8
218.199.69.94 236.32.46.44 20.118.112.155 134.236.197.75