Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hamburg

Region: Hamburg

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.245.200.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;89.245.200.156.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041901 1800 900 604800 86400

;; Query time: 127 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 20 06:07:21 CST 2020
;; MSG SIZE  rcvd: 118
Host info
156.200.245.89.in-addr.arpa domain name pointer i59F5C89C.versanet.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
156.200.245.89.in-addr.arpa	name = i59F5C89C.versanet.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.231.11.25 attackbots
Jan  3 08:10:56 mail sshd\[7741\]: Invalid user fqx from 89.231.11.25
Jan  3 08:10:56 mail sshd\[7741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.231.11.25
...
2020-01-04 01:25:07
198.211.120.59 attackspam
01/03/2020-17:39:20.012284 198.211.120.59 Protocol: 17 ET INFO Session Traversal Utilities for NAT (STUN Binding Response)
2020-01-04 00:52:51
124.106.92.226 attack
Unauthorized connection attempt detected from IP address 124.106.92.226 to port 23
2020-01-04 00:58:06
179.110.227.180 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-01-04 00:52:03
128.1.137.34 attack
Repeated brute force against a port
2020-01-04 01:18:03
70.118.3.102 attack
WordPress login Brute force / Web App Attack on client site.
2020-01-04 01:02:21
89.3.164.128 attackbots
Jan  3 16:10:54 pornomens sshd\[2436\]: Invalid user garry from 89.3.164.128 port 59414
Jan  3 16:10:54 pornomens sshd\[2436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.3.164.128
Jan  3 16:10:56 pornomens sshd\[2436\]: Failed password for invalid user garry from 89.3.164.128 port 59414 ssh2
...
2020-01-04 01:05:15
218.92.0.172 attackbots
Jan  3 17:58:04 arianus sshd\[20699\]: Unable to negotiate with 218.92.0.172 port 12434: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\]
...
2020-01-04 00:58:39
113.1.40.8 attack
Fail2Ban - FTP Abuse Attempt
2020-01-04 00:47:35
35.189.72.205 attackspam
xmlrpc attack
2020-01-04 01:09:26
176.31.191.173 attackbots
Jan  3 14:15:57 srv01 sshd[24386]: Invalid user xkj from 176.31.191.173 port 52110
Jan  3 14:15:57 srv01 sshd[24386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.191.173
Jan  3 14:15:57 srv01 sshd[24386]: Invalid user xkj from 176.31.191.173 port 52110
Jan  3 14:15:59 srv01 sshd[24386]: Failed password for invalid user xkj from 176.31.191.173 port 52110 ssh2
Jan  3 14:19:16 srv01 sshd[24662]: Invalid user stud from 176.31.191.173 port 55358
...
2020-01-04 00:53:58
185.209.0.92 attack
01/03/2020-17:37:51.275577 185.209.0.92 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-04 01:14:33
80.14.253.7 attackspam
Jan  3 15:08:13 localhost sshd\[7668\]: Invalid user hvl from 80.14.253.7 port 43148
Jan  3 15:08:13 localhost sshd\[7668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.14.253.7
Jan  3 15:08:15 localhost sshd\[7668\]: Failed password for invalid user hvl from 80.14.253.7 port 43148 ssh2
2020-01-04 01:00:16
113.161.35.109 attack
Automatic report - SSH Brute-Force Attack
2020-01-04 01:15:59
209.141.46.240 attackbots
SSH Brute Force
2020-01-04 00:52:30

Recently Reported IPs

58.20.172.13 114.231.41.89 37.225.10.8 73.205.234.24
189.222.235.132 40.248.104.228 222.223.103.185 222.71.177.239
217.192.23.219 99.121.28.0 118.151.148.129 111.241.244.13
178.119.194.132 68.238.213.203 175.22.83.246 131.93.100.48
71.81.133.28 178.128.118.192 190.131.44.239 92.89.25.167