Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Antioch

Region: Tennessee

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.89.197.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.89.197.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121502 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 12:40:06 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 13.197.89.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.89.197.13.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
188.166.246.158 attack
SSH Brute Force
2020-08-06 03:54:12
196.27.127.61 attackspam
2020-08-05T01:01:46.362912hostname sshd[109922]: Failed password for root from 196.27.127.61 port 52292 ssh2
...
2020-08-06 04:03:25
180.164.22.149 attack
Bruteforce detected by fail2ban
2020-08-06 03:41:29
117.2.136.234 attackspambots
20 attempts against mh-misbehave-ban on pluto
2020-08-06 04:07:04
171.6.242.178 attack
Port Scan
...
2020-08-06 03:31:30
201.184.169.106 attack
Aug  5 14:08:24 abendstille sshd\[5657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106  user=root
Aug  5 14:08:26 abendstille sshd\[5657\]: Failed password for root from 201.184.169.106 port 53292 ssh2
Aug  5 14:10:07 abendstille sshd\[7344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106  user=root
Aug  5 14:10:09 abendstille sshd\[7344\]: Failed password for root from 201.184.169.106 port 48910 ssh2
Aug  5 14:11:52 abendstille sshd\[9129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106  user=root
...
2020-08-06 03:30:22
85.209.0.100 attackbotsspam
Unauthorized access to SSH at 5/Aug/2020:19:10:10 +0000.
2020-08-06 03:33:00
87.98.155.123 attackspam
Aug  6 03:34:56 itachi1706steam sshd[30902]: Invalid user admin from 87.98.155.123 port 38612
Aug  6 03:34:57 itachi1706steam sshd[30902]: Connection closed by invalid user admin 87.98.155.123 port 38612 [preauth]
Aug  6 03:34:58 itachi1706steam sshd[30904]: Invalid user admin from 87.98.155.123 port 39478
...
2020-08-06 03:57:19
157.44.114.84 attackbots
1596629471 - 08/05/2020 14:11:11 Host: 157.44.114.84/157.44.114.84 Port: 445 TCP Blocked
...
2020-08-06 03:51:04
45.155.125.142 attackbotsspam
TCP src-port=44656   dst-port=25   Listed on   dnsbl-sorbs spamcop zen-spamhaus       (Project Honey Pot rated Suspicious)   (60)
2020-08-06 03:46:21
51.83.131.209 attack
$f2bV_matches
2020-08-06 03:38:09
107.175.33.240 attackbotsspam
$f2bV_matches
2020-08-06 03:39:37
134.122.72.221 attackbotsspam
srv02 Mass scanning activity detected Target: 28837  ..
2020-08-06 03:43:14
51.77.163.177 attack
Aug  5 08:58:37 ws24vmsma01 sshd[6273]: Failed password for root from 51.77.163.177 port 38150 ssh2
...
2020-08-06 03:30:47
195.54.167.47 attackspambots
Aug  5 14:11:22 debian-2gb-nbg1-2 kernel: \[18887943.992555\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.167.47 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=53287 PROTO=TCP SPT=43957 DPT=3322 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-06 03:46:41

Recently Reported IPs

151.140.169.238 82.173.229.216 2.212.218.33 216.212.92.235
70.106.96.82 94.0.124.209 42.48.231.157 238.201.171.238
136.114.231.26 207.75.107.100 154.188.170.63 220.107.217.17
173.78.29.93 135.137.64.32 135.18.129.33 171.236.59.150
133.80.37.66 19.236.167.34 112.164.155.32 59.208.116.84