Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Alba Iulia

Region: Alba

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.136.20.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;89.136.20.219.			IN	A

;; AUTHORITY SECTION:
.			429	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040202 1800 900 604800 86400

;; Query time: 311 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 06:54:27 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 219.20.136.89.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.20.136.89.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
97.87.244.154 attackbotsspam
Dec  7 22:00:11 hanapaa sshd\[14098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=97-87-244-154.static.sgnw.mi.charter.com  user=root
Dec  7 22:00:12 hanapaa sshd\[14098\]: Failed password for root from 97.87.244.154 port 58747 ssh2
Dec  7 22:07:16 hanapaa sshd\[14768\]: Invalid user magarian from 97.87.244.154
Dec  7 22:07:16 hanapaa sshd\[14768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=97-87-244-154.static.sgnw.mi.charter.com
Dec  7 22:07:19 hanapaa sshd\[14768\]: Failed password for invalid user magarian from 97.87.244.154 port 56452 ssh2
2019-12-08 16:21:13
36.66.69.33 attackbots
Dec  8 11:57:30 areeb-Workstation sshd[27361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.66.69.33 
Dec  8 11:57:31 areeb-Workstation sshd[27361]: Failed password for invalid user maze from 36.66.69.33 port 59052 ssh2
...
2019-12-08 16:28:38
180.76.233.148 attackbots
Dec  8 09:16:38 server sshd\[10993\]: Invalid user mt from 180.76.233.148
Dec  8 09:16:38 server sshd\[10993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.233.148 
Dec  8 09:16:41 server sshd\[10993\]: Failed password for invalid user mt from 180.76.233.148 port 60432 ssh2
Dec  8 09:29:07 server sshd\[14922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.233.148  user=root
Dec  8 09:29:09 server sshd\[14922\]: Failed password for root from 180.76.233.148 port 58802 ssh2
...
2019-12-08 16:33:55
117.92.165.31 attack
Email spam message
2019-12-08 16:35:04
106.12.156.160 attackspambots
2019-12-08T08:14:11.008483abusebot-7.cloudsearch.cf sshd\[22621\]: Invalid user orpheus from 106.12.156.160 port 57800
2019-12-08 16:46:16
107.170.204.148 attack
Dec  8 13:21:27 gw1 sshd[19505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.204.148
Dec  8 13:21:30 gw1 sshd[19505]: Failed password for invalid user vl from 107.170.204.148 port 49594 ssh2
...
2019-12-08 16:53:47
118.24.57.240 attackbots
2019-12-08T08:37:08.350967abusebot-3.cloudsearch.cf sshd\[19597\]: Invalid user schooli from 118.24.57.240 port 12902
2019-12-08 16:48:03
123.207.123.252 attack
Dec  8 10:01:37 localhost sshd\[25844\]: Invalid user \|\|\|\|\|\|\| from 123.207.123.252 port 35234
Dec  8 10:01:37 localhost sshd\[25844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.123.252
Dec  8 10:01:39 localhost sshd\[25844\]: Failed password for invalid user \|\|\|\|\|\|\| from 123.207.123.252 port 35234 ssh2
2019-12-08 17:02:19
40.114.76.153 attack
<6 unauthorized SSH connections
2019-12-08 16:44:43
218.92.0.180 attackspam
Dec  8 08:42:46 thevastnessof sshd[27216]: Failed password for root from 218.92.0.180 port 48603 ssh2
...
2019-12-08 16:47:22
222.186.175.140 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
Failed password for root from 222.186.175.140 port 48266 ssh2
Failed password for root from 222.186.175.140 port 48266 ssh2
Failed password for root from 222.186.175.140 port 48266 ssh2
Failed password for root from 222.186.175.140 port 48266 ssh2
2019-12-08 16:29:10
156.214.60.199 attackspambots
UTC: 2019-12-07 port: 23/tcp
2019-12-08 16:58:17
51.77.201.36 attackspambots
Dec  8 10:17:05 server sshd\[28657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-77-201.eu  user=root
Dec  8 10:17:07 server sshd\[28657\]: Failed password for root from 51.77.201.36 port 42436 ssh2
Dec  8 10:24:09 server sshd\[30404\]: Invalid user admin from 51.77.201.36
Dec  8 10:24:09 server sshd\[30404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-77-201.eu 
Dec  8 10:24:12 server sshd\[30404\]: Failed password for invalid user admin from 51.77.201.36 port 52220 ssh2
...
2019-12-08 16:55:51
61.183.195.66 attack
Dec  8 08:24:11 vpn01 sshd[23799]: Failed password for root from 61.183.195.66 port 21132 ssh2
Dec  8 08:32:13 vpn01 sshd[24026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.183.195.66
...
2019-12-08 16:39:41
97.74.229.121 attackspambots
Dec  8 11:39:08 server sshd\[18777\]: Invalid user faass from 97.74.229.121
Dec  8 11:39:08 server sshd\[18777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-97-74-229-121.ip.secureserver.net 
Dec  8 11:39:10 server sshd\[18777\]: Failed password for invalid user faass from 97.74.229.121 port 37960 ssh2
Dec  8 11:48:27 server sshd\[21423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-97-74-229-121.ip.secureserver.net  user=dovecot
Dec  8 11:48:29 server sshd\[21423\]: Failed password for dovecot from 97.74.229.121 port 42960 ssh2
...
2019-12-08 16:54:19

Recently Reported IPs

220.34.193.211 187.142.74.187 115.202.95.83 27.97.155.7
62.151.150.233 59.21.53.52 135.196.67.88 212.47.229.50
104.234.4.111 133.11.250.68 152.231.192.160 70.114.179.185
174.62.125.138 146.151.115.78 189.66.251.40 50.51.125.143
87.195.26.239 148.252.223.94 209.76.82.161 64.219.137.97