Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Baden-Württemberg

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.204.130.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51164
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.204.130.7.			IN	A

;; AUTHORITY SECTION:
.			349	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 09:44:18 CST 2022
;; MSG SIZE  rcvd: 105
Host info
7.130.204.89.in-addr.arpa domain name pointer dynamic-089-204-130-007.89.204.130.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.130.204.89.in-addr.arpa	name = dynamic-089-204-130-007.89.204.130.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.8.211.233 attack
proto=tcp  .  spt=59601  .  dpt=3389  .  src=46.8.211.233  .  dst=xx.xx.4.1  .     (Found on   CINS badguys  Dec 27)     (817)
2019-12-28 05:24:07
179.108.248.122 attackspam
Unauthorized connection attempt from IP address 179.108.248.122 on Port 445(SMB)
2019-12-28 05:52:29
79.17.32.67 attackbots
Honeypot attack, port: 23, PTR: host67-32-dynamic.17-79-r.retail.telecomitalia.it.
2019-12-28 05:31:32
104.197.72.35 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-28 05:30:06
91.242.77.232 attackspam
Unauthorized connection attempt detected from IP address 91.242.77.232 to port 445
2019-12-28 05:51:12
187.113.110.233 attackbots
Honeypot attack, port: 445, PTR: 187.113.110.233.static.host.gvt.net.br.
2019-12-28 05:39:02
3.0.91.111 attack
familiengesundheitszentrum-fulda.de 3.0.91.111 [27/Dec/2019:16:42:03 +0100] "POST /wp-login.php HTTP/1.1" 200 6330 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
familiengesundheitszentrum-fulda.de 3.0.91.111 [27/Dec/2019:16:42:05 +0100] "POST /wp-login.php HTTP/1.1" 200 6288 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-28 05:23:08
189.170.34.78 attack
Unauthorized connection attempt from IP address 189.170.34.78 on Port 445(SMB)
2019-12-28 05:25:18
112.205.212.96 attack
Unauthorized connection attempt from IP address 112.205.212.96 on Port 445(SMB)
2019-12-28 05:47:36
131.255.83.58 attackspambots
Unauthorized connection attempt from IP address 131.255.83.58 on Port 445(SMB)
2019-12-28 05:39:15
49.235.18.9 attack
Dec 27 22:24:04 MK-Soft-VM5 sshd[12225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.18.9 
Dec 27 22:24:07 MK-Soft-VM5 sshd[12225]: Failed password for invalid user conf from 49.235.18.9 port 52544 ssh2
...
2019-12-28 05:53:26
139.5.153.133 attack
Honeypot attack, port: 81, PTR: PTR record not found
2019-12-28 05:45:50
178.188.179.58 attackspambots
Unauthorized connection attempt from IP address 178.188.179.58 on Port 445(SMB)
2019-12-28 05:24:27
95.110.235.17 attack
Invalid user admin from 95.110.235.17 port 45708
2019-12-28 05:41:07
45.146.203.98 attackbotsspam
Autoban   45.146.203.98 AUTH/CONNECT
2019-12-28 05:34:48

Recently Reported IPs

60.137.123.24 86.120.184.219 169.229.187.224 137.226.250.162
98.228.207.166 137.226.232.212 169.229.67.238 137.226.233.105
169.229.66.228 169.229.47.2 169.229.58.86 169.229.45.184
137.226.224.197 180.76.119.191 180.76.114.127 137.226.44.138
137.226.46.110 137.226.43.129 169.229.188.205 85.234.3.144