Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.1.53.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8880
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.1.53.241.			IN	A

;; AUTHORITY SECTION:
.			169	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 15:08:29 CST 2022
;; MSG SIZE  rcvd: 104
Host info
241.53.1.89.in-addr.arpa domain name pointer xdsl-89-1-53-241.nc.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.53.1.89.in-addr.arpa	name = xdsl-89-1-53-241.nc.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.228.182.244 attackspambots
Jun 22 22:34:13 pve1 sshd[17519]: Failed password for root from 94.228.182.244 port 54095 ssh2
Jun 22 22:37:11 pve1 sshd[18669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.228.182.244 
...
2020-06-23 04:47:11
88.158.164.164 attackspam
Unauthorized connection attempt from IP address 88.158.164.164 on Port 445(SMB)
2020-06-23 04:33:03
171.95.186.217 attackspam
Email rejected due to spam filtering
2020-06-23 04:22:13
113.116.6.50 attack
Unauthorized connection attempt from IP address 113.116.6.50 on Port 445(SMB)
2020-06-23 04:31:56
192.35.168.225 attack
 TCP (SYN) 192.35.168.225:53974 -> port 25000, len 44
2020-06-23 04:36:04
80.18.113.223 attackspambots
Unauthorized connection attempt detected from IP address 80.18.113.223 to port 80
2020-06-23 04:35:12
41.32.187.131 attackbots
1433/tcp 445/tcp...
[2020-05-07/06-22]9pkt,2pt.(tcp)
2020-06-23 04:39:50
185.141.110.143 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-06-23 04:29:09
104.248.157.118 attackspam
 TCP (SYN) 104.248.157.118:56517 -> port 21580, len 44
2020-06-23 04:30:13
222.209.208.234 attackspam
ECShop Remote Code Execution Vulnerability
2020-06-23 04:35:32
187.115.239.243 attackspambots
Unauthorized connection attempt from IP address 187.115.239.243 on Port 445(SMB)
2020-06-23 04:20:03
5.196.72.11 attackspambots
Jun 22 15:21:26 marvibiene sshd[64726]: Invalid user demo from 5.196.72.11 port 59806
Jun 22 15:21:26 marvibiene sshd[64726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.72.11
Jun 22 15:21:26 marvibiene sshd[64726]: Invalid user demo from 5.196.72.11 port 59806
Jun 22 15:21:28 marvibiene sshd[64726]: Failed password for invalid user demo from 5.196.72.11 port 59806 ssh2
...
2020-06-23 04:28:48
104.248.122.143 attackspam
sshd jail - ssh hack attempt
2020-06-23 04:27:53
103.110.62.20 attack
Unauthorized connection attempt from IP address 103.110.62.20 on Port 445(SMB)
2020-06-23 04:16:32
62.234.74.168 attack
Jun 22 15:37:33 vserver sshd\[8837\]: Invalid user etluser from 62.234.74.168Jun 22 15:37:36 vserver sshd\[8837\]: Failed password for invalid user etluser from 62.234.74.168 port 50466 ssh2Jun 22 15:42:06 vserver sshd\[8907\]: Failed password for root from 62.234.74.168 port 42178 ssh2Jun 22 15:46:34 vserver sshd\[8944\]: Failed password for root from 62.234.74.168 port 33882 ssh2
...
2020-06-23 04:14:41

Recently Reported IPs

185.140.145.220 109.207.237.213 103.4.66.117 39.194.55.2
0.254.156.146 0.134.25.136 163.205.255.63 121.43.169.102
207.248.201.45 68.108.239.6 91.122.245.17 211.20.47.145
158.201.21.146 88.28.195.55 10.7.107.78 26.89.31.175
63.255.247.204 56.72.95.110 34.64.196.48 155.107.88.250