Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rheinbach

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.21.54.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;89.21.54.61.			IN	A

;; AUTHORITY SECTION:
.			429	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101101 1800 900 604800 86400

;; Query time: 277 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 12 03:12:58 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 61.54.21.89.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 61.54.21.89.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.89.19.147 attack
Invalid user ue from 51.89.19.147 port 51204
2019-10-29 06:58:11
184.71.126.106 attackbotsspam
Invalid user bq from 184.71.126.106 port 38628
2019-10-29 07:06:57
27.150.169.223 attackbotsspam
Invalid user abaco from 27.150.169.223 port 42948
2019-10-29 07:01:08
202.88.241.107 attack
SSH Brute Force, server-1 sshd[16456]: Failed password for invalid user support from 202.88.241.107 port 44244 ssh2
2019-10-29 06:38:59
222.186.180.41 attackbotsspam
Oct 28 23:19:12 herz-der-gamer sshd[1952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Oct 28 23:19:14 herz-der-gamer sshd[1952]: Failed password for root from 222.186.180.41 port 7516 ssh2
...
2019-10-29 06:36:41
72.167.9.245 attackbotsspam
Invalid user usuario from 72.167.9.245 port 40784
2019-10-29 06:55:44
54.38.241.162 attack
Invalid user 0 from 54.38.241.162 port 60826
2019-10-29 06:56:53
202.182.106.136 attackbotsspam
Invalid user hpreform from 202.182.106.136 port 49918
2019-10-29 07:04:17
212.112.98.146 attackbotsspam
Invalid user uegadm from 212.112.98.146 port 44213
2019-10-29 07:03:11
118.126.105.120 attackspambots
Invalid user bnc from 118.126.105.120 port 53384
2019-10-29 06:47:49
103.216.135.9 attackbots
Invalid user ethos from 103.216.135.9 port 45166
2019-10-29 06:29:47
37.187.54.45 attack
Invalid user mailman from 37.187.54.45 port 46616
2019-10-29 06:35:46
218.2.105.133 attackspambots
Oct 28 21:54:16 vpn01 sshd[7996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.2.105.133
Oct 28 21:54:18 vpn01 sshd[7996]: Failed password for invalid user cacti from 218.2.105.133 port 59153 ssh2
...
2019-10-29 06:37:19
123.207.149.93 attackspambots
Invalid user schedule from 123.207.149.93 port 48734
2019-10-29 06:45:25
118.24.197.243 attackspam
Invalid user admin from 118.24.197.243 port 36720
2019-10-29 06:48:34

Recently Reported IPs

45.83.90.99 114.232.2.77 148.63.119.150 56.3.151.172
1.142.111.61 173.61.251.142 137.49.113.187 68.187.75.35
44.241.185.21 68.224.101.122 34.207.81.249 96.33.143.172
218.119.168.84 45.185.62.179 132.205.56.119 124.67.9.99
186.189.130.94 49.65.125.242 65.231.116.198 104.8.10.94