Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '89.169.54.0 - 89.169.55.255'

% Abuse contact for '89.169.54.0 - 89.169.55.255' is 'abuse@aeza.ru'

inetnum:        89.169.54.0 - 89.169.55.255
netname:        Aeza-Network
mnt-domains:    aeza-mnt
mnt-lower:      aeza-mnt
mnt-routes:     aeza-mnt
country:        DE
admin-c:        NT5020-RIPE
abuse-c:        AR79375-RIPE
tech-c:         NT5020-RIPE
org:            ORG-AGL50-RIPE
status:         ASSIGNED PA
mnt-by:         aeza-mnt
mnt-by:         lir-ru-aezagroup-1-MNT
mnt-by:         webrocket-mnt
created:        2024-11-06T17:06:25Z
last-modified:  2026-03-05T18:22:07Z
source:         RIPE
geofeed:        https://aeza.net/static/ipv4_f.csv

organisation:   ORG-AGL50-RIPE
org-name:       AEZA GROUP LLC
country:        RU
org-type:       LIR
address:        Room 1N, Office 603, Hse 15, Building 1, Zolnaya Street, Pravoberezhny
address:        193318
address:        Saint Petersburg
address:        RUSSIAN FEDERATION
phone:          +79650135518
phone:          +78002006013
admin-c:        NT5020-RIPE
tech-c:         NT5020-RIPE
abuse-c:        AR79375-RIPE
mnt-ref:        lir-ru-aezagroup-1-MNT
mnt-ref:        aeza-mnt
mnt-ref:        IVC-MNT
mnt-ref:        Renets-mnt
mnt-ref:        VF1-MNT
mnt-ref:        DN-MNT
mnt-ref:        WEBROCKET-MNT
mnt-ref:        QWARTA-MNT
mnt-ref:        ROSNIIROS-MNT
mnt-ref:        mnt-ru-am-1
mnt-ref:        IROST-MNT
mnt-ref:        JD-RIPE-MNT
mnt-ref:        AS15509-MNT
mnt-ref:        sistemallc-mnt
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         lir-ru-aezagroup-1-MNT
created:        2025-12-29T09:59:14Z
last-modified:  2026-03-06T16:19:59Z
source:         RIPE # Filtered

role:           NOC team
address:        RUSSIAN FEDERATION
address:        Saint Petersburg
address:        193318
address:        Room 1N, Office 603, Hse 15, Building 1,
                Zolnaya Street, Pravoberezhny
phone:          +78002006013
nic-hdl:        NT5020-RIPE
mnt-by:         lir-ru-aezagroup-1-MNT
created:        2025-12-29T09:59:13Z
last-modified:  2025-12-29T09:59:13Z
source:         RIPE # Filtered

% Information related to '89.169.54.0/23AS210644'

route:          89.169.54.0/23
origin:         AS210644
mnt-by:         aeza-mnt
mnt-by:         AEZA-NETWORK-MNT
created:        2024-03-21T15:13:46Z
last-modified:  2024-03-21T15:13:46Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.169.55.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.169.55.117.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030701 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 08 09:00:20 CST 2026
;; MSG SIZE  rcvd: 106
Host info
117.55.169.89.in-addr.arpa domain name pointer testvpn.ptr.network.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.55.169.89.in-addr.arpa	name = testvpn.ptr.network.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
205.185.118.61 attackbots
fire
2019-08-09 10:50:15
200.27.131.51 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:28:14,895 INFO [amun_request_handler] PortScan Detected on Port: 445 (200.27.131.51)
2019-08-09 10:18:22
203.114.102.69 attackspambots
2019-08-09T02:50:14.772334abusebot-6.cloudsearch.cf sshd\[28740\]: Invalid user elton from 203.114.102.69 port 59310
2019-08-09 10:54:13
66.45.225.233 attackbots
Aug  8 23:47:40 [HOSTNAME] sshd[15870]: Invalid user 123n from 66.45.225.233 port 39090
Aug  8 23:48:07 [HOSTNAME] sshd[15873]: Invalid user qwert123 from 66.45.225.233 port 54844
Aug  8 23:48:34 [HOSTNAME] sshd[15888]: Invalid user 1q2w3e4r from 66.45.225.233 port 42518
...
2019-08-09 10:37:14
206.189.217.240 attackbots
fire
2019-08-09 10:41:21
218.155.189.208 attackspam
Aug  9 08:08:53 lcl-usvr-01 sshd[15270]: Invalid user gnoses from 218.155.189.208
Aug  9 08:08:53 lcl-usvr-01 sshd[15270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.155.189.208 
Aug  9 08:08:53 lcl-usvr-01 sshd[15270]: Invalid user gnoses from 218.155.189.208
Aug  9 08:08:55 lcl-usvr-01 sshd[15270]: Failed password for invalid user gnoses from 218.155.189.208 port 51214 ssh2
Aug  9 08:15:51 lcl-usvr-01 sshd[19097]: Invalid user pop from 218.155.189.208
2019-08-09 10:53:00
213.32.39.236 attack
Aug  9 00:04:30 SilenceServices sshd[4306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.39.236
Aug  9 00:04:32 SilenceServices sshd[4306]: Failed password for invalid user website from 213.32.39.236 port 45918 ssh2
Aug  9 00:08:32 SilenceServices sshd[9036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.39.236
2019-08-09 10:38:39
142.93.195.189 attackbotsspam
Aug  9 01:08:59 master sshd[13430]: Failed password for root from 142.93.195.189 port 38612 ssh2
Aug  9 01:33:30 master sshd[13748]: Failed password for invalid user ts3srv from 142.93.195.189 port 42014 ssh2
Aug  9 01:37:32 master sshd[13750]: Failed password for invalid user contabilidad from 142.93.195.189 port 35786 ssh2
Aug  9 01:41:19 master sshd[13752]: Failed password for invalid user ravi from 142.93.195.189 port 57788 ssh2
Aug  9 01:45:12 master sshd[13763]: Failed password for invalid user craig from 142.93.195.189 port 51554 ssh2
Aug  9 01:49:12 master sshd[13765]: Failed password for invalid user r00t from 142.93.195.189 port 45324 ssh2
Aug  9 01:53:14 master sshd[13770]: Failed password for invalid user cron from 142.93.195.189 port 39092 ssh2
Aug  9 01:57:12 master sshd[13772]: Failed password for invalid user contact from 142.93.195.189 port 32860 ssh2
Aug  9 02:01:07 master sshd[14076]: Failed password for invalid user administrator from 142.93.195.189 port 54860 ssh2
Aug  9 02:05:14 master s
2019-08-09 10:56:03
206.189.152.215 attackspambots
fire
2019-08-09 10:44:13
94.28.54.6 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:49:01,202 INFO [shellcode_manager] (94.28.54.6) no match, writing hexdump (5af1e181fef810fc4f0ebd581e889a86 :1851490) - SMB (Unknown)
2019-08-09 10:23:42
206.189.23.43 attackbotsspam
fire
2019-08-09 10:40:40
5.135.135.116 attackspambots
Aug  8 23:50:37 MK-Soft-VM7 sshd\[30830\]: Invalid user ad from 5.135.135.116 port 39614
Aug  8 23:50:37 MK-Soft-VM7 sshd\[30830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.135.116
Aug  8 23:50:39 MK-Soft-VM7 sshd\[30830\]: Failed password for invalid user ad from 5.135.135.116 port 39614 ssh2
...
2019-08-09 10:29:16
222.186.52.155 attackbotsspam
2019-08-09T02:38:13.368747abusebot-3.cloudsearch.cf sshd\[20791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.155  user=root
2019-08-09 10:47:20
159.65.129.64 attackspam
Aug  9 04:10:25 SilenceServices sshd[23524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.129.64
Aug  9 04:10:27 SilenceServices sshd[23524]: Failed password for invalid user webtool from 159.65.129.64 port 48804 ssh2
Aug  9 04:15:25 SilenceServices sshd[28780]: Failed password for root from 159.65.129.64 port 42610 ssh2
2019-08-09 10:27:39
157.230.28.16 attack
Aug  9 03:23:32 ms-srv sshd[25142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.28.16
Aug  9 03:23:35 ms-srv sshd[25142]: Failed password for invalid user coen from 157.230.28.16 port 60732 ssh2
2019-08-09 10:23:57

Recently Reported IPs

20.64.105.126 121.234.219.184 2606:4700:10::6814:5647 2606:4700:10::6814:6329
2606:4700:10::6814:6102 2606:4700:10::6814:8011 2606:4700:20::681a:501 2606:4700:10::ac43:935
2606:4700:10::ac43:1213 2606:4700:10::6814:6142 109.167.82.69 35.220.130.2
49.232.183.185 121.230.89.36 2606:4700:10::6814:9901 2606:4700:10::6814:9956
2606:4700:10::ac43:703 2606:4700:10::6816:1682 14.207.194.29 2606:4700:10::6814:4429