Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
89.163.225.146 attackspam
email spam
2020-09-23 23:58:00
89.163.225.183 attackspambots
89.163.225.183 was recorded 5 times by 5 hosts attempting to connect to the following ports: 389. Incident counter (4h, 24h, all-time): 5, 6, 71
2020-04-06 18:13:27
89.163.225.183 attackspam
Port 53586 scan denied
2020-04-03 14:48:07
89.163.225.183 attack
" "
2020-03-31 20:42:16
89.163.225.146 attackbots
massive "Höhle der Löwen" / CryptoCurrency Spam over weeks
2020-03-20 02:56:33
89.163.225.107 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 86 - port: 3702 proto: UDP cat: Misc Attack
2020-02-09 03:34:27
89.163.225.107 attackbots
89.163.225.107 was recorded 15 times by 9 hosts attempting to connect to the following ports: 33848,41794,6881. Incident counter (4h, 24h, all-time): 15, 63, 291
2020-02-08 04:07:31
89.163.225.107 attack
89.163.225.107 was recorded 17 times by 13 hosts attempting to connect to the following ports: 30718,41794. Incident counter (4h, 24h, all-time): 17, 48, 209
2020-02-05 22:48:55
89.163.225.107 attack
Feb  4 12:13:55 debian-2gb-nbg1-2 kernel: \[3074085.021075\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.163.225.107 DST=195.201.40.59 LEN=33 TOS=0x00 PREC=0x00 TTL=53 ID=58722 DF PROTO=UDP SPT=45827 DPT=3702 LEN=13
2020-02-04 19:15:10
89.163.225.107 attackbotsspam
89.163.225.107 was recorded 15 times by 12 hosts attempting to connect to the following ports: 3283,17185. Incident counter (4h, 24h, all-time): 15, 32, 105
2020-02-04 10:11:52
89.163.225.101 attack
Being used to send massive amounts of spamvertising emails for online casinos, psychic readings, male health products, insurance, and numerous other products. These mails come in huge batches of 10-20 at a time, within seconds or minutes of each other.
2019-07-19 09:44:54
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.163.225.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35023
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.163.225.249.			IN	A

;; AUTHORITY SECTION:
.			285	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011701 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 18 04:39:16 CST 2022
;; MSG SIZE  rcvd: 107
Host info
249.225.163.89.in-addr.arpa domain name pointer ms503.moonshot.dedicated.server-hosting.expert.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.225.163.89.in-addr.arpa	name = ms503.moonshot.dedicated.server-hosting.expert.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.206.128.58 attack
TCP 3389 (RDP)
2019-08-05 22:46:49
101.30.232.128 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=57252)(08050931)
2019-08-05 22:48:27
81.22.45.25 attack
08/05/2019-10:25:56.084339 81.22.45.25 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 79
2019-08-05 22:34:55
180.126.229.250 attackspambots
vulcan
2019-08-05 22:24:43
36.72.70.165 attackspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=63443)(08050931)
2019-08-05 22:36:44
81.22.45.29 attackspambots
08/05/2019-10:26:58.398720 81.22.45.29 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-05 22:49:06
104.140.188.10 attack
TCP 3389 (RDP)
2019-08-05 22:17:45
217.58.31.9 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=40296)(08050931)
2019-08-05 22:38:34
66.212.168.13 attackbots
firewall-block, port(s): 445/tcp
2019-08-05 23:02:30
68.183.83.164 attackbots
Bruteforce on SSH Honeypot
2019-08-05 22:50:15
116.226.3.181 attackspam
[portscan] tcp/22 [SSH]
*(RWIN=31689)(08050931)
2019-08-05 22:16:40
89.83.126.36 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-05 23:02:07
185.79.15.38 attack
Automatic report - Port Scan Attack
2019-08-05 22:41:03
103.78.180.96 attack
[portscan] tcp/23 [TELNET]
*(RWIN=14600)(08050931)
2019-08-05 22:48:04
37.252.10.48 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 22:09:25

Recently Reported IPs

46.152.137.213 153.222.112.151 22.120.136.79 244.144.180.226
85.14.32.12 206.47.108.17 3.95.157.23 181.16.169.161
181.115.30.138 116.114.174.124 85.14.32.27 126.167.31.46
54.244.81.172 46.152.201.13 92.246.172.224 195.170.166.6
56.243.12.211 203.232.27.237 223.24.152.177 224.200.102.79