Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '89.124.8.0 - 89.124.11.255'

% Abuse contact for '89.124.8.0 - 89.124.11.255' is 'abuse.lt@delska.com'

inetnum:        89.124.8.0 - 89.124.11.255
netname:        LT-DLC-20060308
country:        LT
org:            ORG-DLCL1-RIPE
admin-c:        DS19492-RIPE
tech-c:         DS19492-RIPE
status:         ALLOCATED PA
mnt-by:         MNT-DATALOGISTICS
mnt-by:         RIPE-NCC-HM-MNT
created:        2025-10-31T13:58:47Z
last-modified:  2025-10-31T13:58:47Z
source:         RIPE

organisation:   ORG-DLCL1-RIPE
org-name:       UAB Delska Lithuania
country:        LT
org-type:       LIR
address:        A. Juozapaviciaus 13
address:        LT-09311
address:        Vilnius
address:        LITHUANIA
phone:          +37061827222
phone:          +37061844445
abuse-c:        AC28029-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        MNT-DATALOGISTICS
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MNT-DATALOGISTICS
created:        2014-12-17T15:05:21Z
last-modified:  2025-12-02T12:25:50Z
source:         RIPE # Filtered

person:         Donatas Sinickas
address:        Delska Lithuania UAB
address:        A. Juozapaviciaus 13, Vilnius, Lithuania
phone:          +370 6184 4445
nic-hdl:        DS19492-RIPE
mnt-by:         MNT-DATALOGISTICS
created:        2016-11-02T14:15:23Z
last-modified:  2025-10-30T14:10:21Z
source:         RIPE # Filtered

% Information related to '89.124.8.0/24AS201201'

route:          89.124.8.0/24
origin:         AS201201
mnt-by:         MNT-DATALOGISTICS
created:        2025-11-06T12:49:19Z
last-modified:  2025-11-06T12:49:19Z
source:         RIPE

% Information related to '89.124.8.0/24AS215373'

route:          89.124.8.0/24
origin:         AS215373
mnt-by:         MNT-DATALOGISTICS
created:        2025-11-07T17:47:06Z
last-modified:  2025-11-07T17:47:06Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.124.8.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19481
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.124.8.33.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 13:38:16 CST 2026
;; MSG SIZE  rcvd: 104
Host info
Host 33.8.124.89.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 33.8.124.89.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.149.222.94 attackbots
Unauthorized connection attempt from IP address 202.149.222.94 on Port 445(SMB)
2020-06-06 00:12:40
220.158.148.132 attackspam
Jun  5 21:58:24 web1 sshd[29846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.158.148.132  user=root
Jun  5 21:58:26 web1 sshd[29846]: Failed password for root from 220.158.148.132 port 44650 ssh2
Jun  5 22:07:28 web1 sshd[32381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.158.148.132  user=root
Jun  5 22:07:30 web1 sshd[32381]: Failed password for root from 220.158.148.132 port 56114 ssh2
Jun  5 22:10:58 web1 sshd[932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.158.148.132  user=root
Jun  5 22:11:00 web1 sshd[932]: Failed password for root from 220.158.148.132 port 54652 ssh2
Jun  5 22:14:24 web1 sshd[1728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.158.148.132  user=root
Jun  5 22:14:26 web1 sshd[1728]: Failed password for root from 220.158.148.132 port 53188 ssh2
Jun  5 22:17:46 web1 sshd[
...
2020-06-06 00:47:17
202.131.69.18 attackbots
Jun  5 15:37:55 XXX sshd[61072]: Invalid user anariauto from 202.131.69.18 port 52966
2020-06-06 00:29:41
51.83.66.171 attack
SmallBizIT.US 4 packets to tcp(992,6009,9200,9444)
2020-06-06 00:22:57
114.119.166.21 attackbotsspam
Auto block
2020-06-06 00:32:08
164.132.98.229 attackbotsspam
164.132.98.229 - - [05/Jun/2020:13:59:48 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.98.229 - - [05/Jun/2020:13:59:48 +0200] "POST /wp-login.php HTTP/1.1" 200 2031 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.98.229 - - [05/Jun/2020:13:59:48 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.98.229 - - [05/Jun/2020:13:59:48 +0200] "POST /wp-login.php HTTP/1.1" 200 2008 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.98.229 - - [05/Jun/2020:13:59:49 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.98.229 - - [05/Jun/2020:13:59:49 +0200] "POST /wp-login.php HTTP/1.1" 200 2009 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/201001
...
2020-06-06 00:38:06
101.99.81.158 attackbotsspam
Jun  5 17:00:10 hell sshd[18904]: Failed password for root from 101.99.81.158 port 43427 ssh2
...
2020-06-06 00:13:49
107.174.244.100 attackspam
ET COMPROMISED Known Compromised or Hostile Host Traffic group 1 - port: 80 proto: TCP cat: Misc Attack
2020-06-06 00:20:14
60.249.82.121 attackspambots
2020-06-05T14:54:41.437458Z c730fe412cf1 New connection: 60.249.82.121:37370 (172.17.0.3:2222) [session: c730fe412cf1]
2020-06-05T15:06:43.670227Z 25572401df5c New connection: 60.249.82.121:60988 (172.17.0.3:2222) [session: 25572401df5c]
2020-06-06 00:27:57
216.218.206.77 attack
 TCP (SYN) 216.218.206.77:43239 -> port 443, len 44
2020-06-06 00:53:59
124.113.219.162 attack
Spammer
2020-06-06 00:25:59
202.51.126.4 attackbotsspam
Brute-force attempt banned
2020-06-06 00:20:44
49.88.112.70 attack
2020-06-05T16:18:17.431828shield sshd\[13307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70  user=root
2020-06-05T16:18:19.720882shield sshd\[13307\]: Failed password for root from 49.88.112.70 port 20737 ssh2
2020-06-05T16:18:22.170436shield sshd\[13307\]: Failed password for root from 49.88.112.70 port 20737 ssh2
2020-06-05T16:18:24.364132shield sshd\[13307\]: Failed password for root from 49.88.112.70 port 20737 ssh2
2020-06-05T16:25:43.286689shield sshd\[13949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70  user=root
2020-06-06 00:39:21
188.165.236.122 attackbotsspam
Jun  5 15:37:44 home sshd[24059]: Failed password for root from 188.165.236.122 port 58311 ssh2
Jun  5 15:41:24 home sshd[24475]: Failed password for root from 188.165.236.122 port 36965 ssh2
...
2020-06-06 00:29:59
138.122.4.131 attack
Distributed brute force attack
2020-06-06 00:35:46

Recently Reported IPs

85.217.149.24 168.143.104.245 211.95.64.140 92.41.9.27
53.20.112.184 87.244.136.131 110.77.226.46 2606:4700:10::6814:5432
110.78.153.117 2606:4700:10::ac43:2318 2606:4700:10::6814:6794 2606:4700:10::ac43:2394
6.104.232.210 185.23.46.40 208.80.248.225 54.105.246.56
91.65.186.135 31.77.102.54 2606:4700:10::ac43:2019 2606:4700:10::6814:7032