Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Luxembourg

Region: Canton de Luxembourg

Country: Luxembourg

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       64.89.160.0 - 64.89.163.255
CIDR:           64.89.160.0/22
NetName:        NETIFACE-NA1
NetHandle:      NET-64-89-160-0-1
Parent:         NET64 (NET-64-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Netiface America, Inc. (NA-520)
RegDate:        2026-01-13
Updated:        2026-01-13
Ref:            https://rdap.arin.net/registry/ip/64.89.160.0


OrgName:        Netiface America, Inc.
OrgId:          NA-520
Address:        124 City Road
City:           London
StateProv:      
PostalCode:     EC1V 2NX
Country:        GB
RegDate:        2024-12-29
Updated:        2026-03-23
Ref:            https://rdap.arin.net/registry/entity/NA-520


OrgAbuseHandle: ABUSE9563-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +447404814404 
OrgAbuseEmail:  abuse@miteflux.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9563-ARIN

OrgTechHandle: ADMIN8922-ARIN
OrgTechName:   Administrator
OrgTechPhone:  +447872339334 
OrgTechEmail:  noc@miteflux.co.uk
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN8922-ARIN

# end


# start

NetRange:       64.89.160.0 - 64.89.161.255
CIDR:           64.89.160.0/23
NetName:        GHOSTY-NETWORKS-LU
NetHandle:      NET-64-89-160-0-2
Parent:         NETIFACE-NA1 (NET-64-89-160-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Ghosty Networks LLC (C11486629)
RegDate:        2026-01-25
Updated:        2026-02-07
Comment:        Abuse: abuse@ghostynetworks.com
Comment:        Geofeed https://api.geofeed.space/a7283d0a-24e8-4744-8d7b-b5087cf20755/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/64.89.160.0


CustName:       Ghosty Networks LLC
Address:        12D Impasse Drosbach
City:           Luxembourg
StateProv:      Luxembourg
PostalCode:     L-1882
Country:        LU
RegDate:        2026-01-25
Updated:        2026-02-07
Ref:            https://rdap.arin.net/registry/entity/C11486629

OrgAbuseHandle: ABUSE9563-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +447404814404 
OrgAbuseEmail:  abuse@miteflux.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9563-ARIN

OrgTechHandle: ADMIN8922-ARIN
OrgTechName:   Administrator
OrgTechPhone:  +447872339334 
OrgTechEmail:  noc@miteflux.co.uk
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN8922-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.89.160.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25825
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.89.160.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042202 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 08:00:32 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 114.160.89.64.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.160.89.64.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.54.163.106 attack
5x Failed Password
2020-04-06 14:48:28
156.0.71.125 attackspambots
trying to access non-authorized port
2020-04-06 14:36:09
222.186.30.112 attackspambots
Apr  6 08:43:54 dcd-gentoo sshd[6704]: User root from 222.186.30.112 not allowed because none of user's groups are listed in AllowGroups
Apr  6 08:43:58 dcd-gentoo sshd[6704]: error: PAM: Authentication failure for illegal user root from 222.186.30.112
Apr  6 08:43:54 dcd-gentoo sshd[6704]: User root from 222.186.30.112 not allowed because none of user's groups are listed in AllowGroups
Apr  6 08:43:58 dcd-gentoo sshd[6704]: error: PAM: Authentication failure for illegal user root from 222.186.30.112
Apr  6 08:43:54 dcd-gentoo sshd[6704]: User root from 222.186.30.112 not allowed because none of user's groups are listed in AllowGroups
Apr  6 08:43:58 dcd-gentoo sshd[6704]: error: PAM: Authentication failure for illegal user root from 222.186.30.112
Apr  6 08:43:58 dcd-gentoo sshd[6704]: Failed keyboard-interactive/pam for invalid user root from 222.186.30.112 port 39948 ssh2
...
2020-04-06 14:45:27
111.230.140.177 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-04-06 14:11:47
171.83.18.156 attackbotsspam
Fail2Ban Ban Triggered
2020-04-06 14:35:03
46.4.121.137 attackbots
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-04-06 14:23:42
103.129.223.126 attackbotsspam
Attempted WordPress login: "GET /wp-login.php"
2020-04-06 14:11:00
190.145.255.246 attack
email spam
2020-04-06 14:19:19
222.186.173.142 attackbots
Apr  6 13:21:54 webhost01 sshd[19856]: Failed password for root from 222.186.173.142 port 39692 ssh2
Apr  6 13:22:08 webhost01 sshd[19856]: error: maximum authentication attempts exceeded for root from 222.186.173.142 port 39692 ssh2 [preauth]
...
2020-04-06 14:23:10
144.217.34.147 attackbots
144.217.34.147 was recorded 7 times by 7 hosts attempting to connect to the following ports: 2303. Incident counter (4h, 24h, all-time): 7, 17, 1345
2020-04-06 14:30:52
218.92.0.200 attackspambots
Apr  6 07:52:25 legacy sshd[6586]: Failed password for root from 218.92.0.200 port 51030 ssh2
Apr  6 07:52:27 legacy sshd[6586]: Failed password for root from 218.92.0.200 port 51030 ssh2
Apr  6 07:52:30 legacy sshd[6586]: Failed password for root from 218.92.0.200 port 51030 ssh2
...
2020-04-06 14:02:45
222.186.169.192 attackbots
2020-04-06T06:43:56.494476abusebot-7.cloudsearch.cf sshd[19393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
2020-04-06T06:43:58.311036abusebot-7.cloudsearch.cf sshd[19393]: Failed password for root from 222.186.169.192 port 36232 ssh2
2020-04-06T06:44:01.742629abusebot-7.cloudsearch.cf sshd[19393]: Failed password for root from 222.186.169.192 port 36232 ssh2
2020-04-06T06:43:56.494476abusebot-7.cloudsearch.cf sshd[19393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
2020-04-06T06:43:58.311036abusebot-7.cloudsearch.cf sshd[19393]: Failed password for root from 222.186.169.192 port 36232 ssh2
2020-04-06T06:44:01.742629abusebot-7.cloudsearch.cf sshd[19393]: Failed password for root from 222.186.169.192 port 36232 ssh2
2020-04-06T06:43:56.494476abusebot-7.cloudsearch.cf sshd[19393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 
...
2020-04-06 14:47:50
92.118.37.55 attackspam
Apr608:26:31server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=92.118.37.55DST=136.243.224.53LEN=40TOS=0x00PREC=0x00TTL=249ID=1913PROTO=TCPSPT=47633DPT=23969WINDOW=1024RES=0x00SYNURGP=0Apr608:26:33server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=92.118.37.55DST=136.243.224.52LEN=40TOS=0x00PREC=0x00TTL=249ID=12901PROTO=TCPSPT=47633DPT=32508WINDOW=1024RES=0x00SYNURGP=0Apr608:26:45server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=92.118.37.55DST=136.243.224.50LEN=40TOS=0x00PREC=0x00TTL=249ID=542PROTO=TCPSPT=47633DPT=3381WINDOW=1024RES=0x00SYNURGP=0Apr608:26:46server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=92.118.37.55DST=136.243.224.53LEN=40TOS=0x00PREC=0x00TTL=249ID=12432PROTO=TCPSPT=47633DPT=39363WINDOW=1024RES=0x00SYNURGP=0Apr608:27:09server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:
2020-04-06 14:39:31
51.38.231.249 attackspam
$f2bV_matches
2020-04-06 14:14:10
152.32.143.5 attack
Apr  6 07:44:37 srv01 sshd[22615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.143.5  user=root
Apr  6 07:44:39 srv01 sshd[22615]: Failed password for root from 152.32.143.5 port 40600 ssh2
Apr  6 07:47:12 srv01 sshd[22774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.143.5  user=root
Apr  6 07:47:15 srv01 sshd[22774]: Failed password for root from 152.32.143.5 port 50206 ssh2
Apr  6 07:49:53 srv01 sshd[22941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.143.5  user=root
Apr  6 07:49:54 srv01 sshd[22941]: Failed password for root from 152.32.143.5 port 59818 ssh2
...
2020-04-06 14:29:13

Recently Reported IPs

2606:4700:10::6814:6231 2606:4700:10::6814:7868 35.195.56.172 2606:4700:10::6814:9037
45.156.129.191 2606:4700:10::6814:7405 2606:4700:10::6814:6300 91.231.89.71
91.196.152.233 147.185.133.72 2606:4700:10::6814:9329 2606:4700:10::6814:7319
2606:4700:10::6814:9857 248.22.207.162 172.237.116.71 94.142.240.71
2.139.215.96 168.222.181.192 166.205.38.127 163.12.169.125