Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Prague

Region: Hlavni mesto Praha

Country: Czechia

Internet Service Provider: unknown

Hostname: unknown

Organization: Dempsey and Clark s.r.o.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.22.68.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62823
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;89.22.68.152.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090401 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Sep 05 00:14:38 CST 2019
;; MSG SIZE  rcvd: 116
Host info
152.68.22.89.in-addr.arpa domain name pointer srv1.popper.cz.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
152.68.22.89.in-addr.arpa	name = srv1.popper.cz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.91.108.57 attackbots
Jun  8 16:10:16 fhem-rasp sshd[21791]: Failed password for root from 51.91.108.57 port 54558 ssh2
Jun  8 16:10:17 fhem-rasp sshd[21791]: Disconnected from authenticating user root 51.91.108.57 port 54558 [preauth]
...
2020-06-08 23:42:19
142.93.226.18 attackspambots
Jun  8 11:57:45 marvibiene sshd[10128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.226.18  user=root
Jun  8 11:57:46 marvibiene sshd[10128]: Failed password for root from 142.93.226.18 port 37764 ssh2
Jun  8 12:06:52 marvibiene sshd[10208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.226.18  user=root
Jun  8 12:06:54 marvibiene sshd[10208]: Failed password for root from 142.93.226.18 port 45352 ssh2
...
2020-06-08 23:00:55
142.93.137.144 attack
Jun  8 09:03:38 firewall sshd[4938]: Failed password for root from 142.93.137.144 port 52104 ssh2
Jun  8 09:06:43 firewall sshd[5032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.137.144  user=root
Jun  8 09:06:44 firewall sshd[5032]: Failed password for root from 142.93.137.144 port 53576 ssh2
...
2020-06-08 23:07:54
122.162.178.115 attackspam
Jun  8 14:02:51 web sshd[128258]: Failed password for root from 122.162.178.115 port 55408 ssh2
Jun  8 14:06:07 web sshd[128275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.162.178.115  user=root
Jun  8 14:06:09 web sshd[128275]: Failed password for root from 122.162.178.115 port 51578 ssh2
...
2020-06-08 23:39:14
159.203.70.169 attack
Automatic report - XMLRPC Attack
2020-06-08 23:44:19
84.33.99.21 attackspambots
IP 84.33.99.21 attacked honeypot on port: 8080 at 6/8/2020 1:06:06 PM
2020-06-08 23:33:02
222.186.30.35 attackbotsspam
08.06.2020 15:17:56 SSH access blocked by firewall
2020-06-08 23:19:30
223.223.187.2 attack
Jun  8 15:11:19 vps639187 sshd\[4850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.187.2  user=root
Jun  8 15:11:21 vps639187 sshd\[4850\]: Failed password for root from 223.223.187.2 port 44431 ssh2
Jun  8 15:13:39 vps639187 sshd\[4857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.187.2  user=root
...
2020-06-08 23:11:22
106.12.113.111 attackspambots
Jun  8 14:14:48 piServer sshd[15628]: Failed password for root from 106.12.113.111 port 38728 ssh2
Jun  8 14:18:58 piServer sshd[15911]: Failed password for root from 106.12.113.111 port 36886 ssh2
...
2020-06-08 23:32:41
163.172.60.213 attackspambots
Automatic report - XMLRPC Attack
2020-06-08 23:02:47
222.186.175.169 attack
2020-06-08T17:17:32.494108vps751288.ovh.net sshd\[3161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
2020-06-08T17:17:34.036426vps751288.ovh.net sshd\[3161\]: Failed password for root from 222.186.175.169 port 5072 ssh2
2020-06-08T17:17:47.611503vps751288.ovh.net sshd\[3163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
2020-06-08T17:17:49.545147vps751288.ovh.net sshd\[3163\]: Failed password for root from 222.186.175.169 port 57156 ssh2
2020-06-08T17:17:53.168099vps751288.ovh.net sshd\[3163\]: Failed password for root from 222.186.175.169 port 57156 ssh2
2020-06-08 23:22:12
49.128.172.117 attack
Fail2Ban - HTTP Auth Bruteforce Attempt
2020-06-08 22:59:10
5.188.66.49 attackspam
Jun  8 11:54:30 ws22vmsma01 sshd[14115]: Failed password for root from 5.188.66.49 port 36174 ssh2
...
2020-06-08 23:29:30
61.51.95.234 attack
Jun  8 17:13:06 lukav-desktop sshd\[31245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.51.95.234  user=root
Jun  8 17:13:08 lukav-desktop sshd\[31245\]: Failed password for root from 61.51.95.234 port 48892 ssh2
Jun  8 17:15:09 lukav-desktop sshd\[5451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.51.95.234  user=root
Jun  8 17:15:10 lukav-desktop sshd\[5451\]: Failed password for root from 61.51.95.234 port 33770 ssh2
Jun  8 17:17:25 lukav-desktop sshd\[5504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.51.95.234  user=root
2020-06-08 23:25:19
66.249.155.245 attack
Jun  8 14:10:34 rush sshd[5559]: Failed password for root from 66.249.155.245 port 50782 ssh2
Jun  8 14:14:59 rush sshd[5731]: Failed password for root from 66.249.155.245 port 53446 ssh2
...
2020-06-08 23:21:45

Recently Reported IPs

122.252.227.125 161.152.115.119 122.106.181.219 39.37.59.46
207.68.184.145 68.228.68.134 87.9.171.124 197.13.157.199
204.91.7.161 79.109.16.20 32.110.62.111 148.56.232.204
177.37.187.195 12.50.83.124 27.219.20.29 54.80.155.58
223.9.209.192 191.157.94.90 153.193.179.52 158.191.212.129