Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: Incrediserve Ltd

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbotsspam
firewall-block, port(s): 1052/tcp, 1053/tcp
2019-06-30 07:18:28
attackbotsspam
¯\_(ツ)_/¯
2019-06-26 08:36:58
attackbots
24.06.2019 12:06:31 Connection to port 1034 blocked by firewall
2019-06-24 23:14:36
Comments on same subnet:
IP Type Details Datetime
89.248.168.226 attack
Scan port
2023-03-21 13:42:59
89.248.168.226 attack
Scan port
2023-02-20 13:47:15
89.248.168.112 attackbots
" "
2020-10-14 09:18:12
89.248.168.157 attack
firewall-block, port(s): 2551/tcp
2020-10-13 13:05:44
89.248.168.157 attackbots
firewall-block, port(s): 2550/tcp
2020-10-13 05:52:28
89.248.168.157 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 78 - port: 2080 proto: tcp cat: Misc Attackbytes: 60
2020-10-11 02:13:51
89.248.168.112 attackbots
firewall-block, port(s): 5269/tcp
2020-10-10 22:40:01
89.248.168.157 attackspam
Port Scan: TCP/2069
2020-10-10 17:58:35
89.248.168.112 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 78 - port: 5009 proto: tcp cat: Misc Attackbytes: 60
2020-10-10 14:32:23
89.248.168.176 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 78 - port: 1064 proto: tcp cat: Misc Attackbytes: 60
2020-10-08 03:19:09
89.248.168.176 attackbotsspam
firewall-block, port(s): 1058/tcp
2020-10-07 19:33:35
89.248.168.217 attackspambots
Multiport scan 36 ports : 9(x15) 88(x14) 135(x14) 139(x13) 177(x12) 514(x12) 593(x13) 996(x13) 999(x13) 1025(x14) 1028(x14) 1031(x14) 1046(x14) 1053(x14) 1057(x14) 1062(x14) 1068(x14) 1081(x13) 1101(x13) 1194(x14) 1719(x14) 1812(x15) 4244(x15) 4431(x15) 5000(x14) 5011(x14) 5051(x15) 5556(x15) 6481(x15) 6656(x14) 6886(x13) 8333(x14) 9160(x13) 14147(x13) 16000(x14) 22547(x15)
2020-10-05 06:23:29
89.248.168.217 attackspam
 UDP 89.248.168.217:48123 -> port 1194, len 64
2020-10-04 22:24:25
89.248.168.217 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 76 - port: 1062 proto: udp cat: Misc Attackbytes: 71
2020-10-04 14:10:26
89.248.168.157 attack
Port Scan
...
2020-10-04 06:46:37
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.248.168.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33191
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;89.248.168.3.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019053101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 01 11:53:35 CST 2019
;; MSG SIZE  rcvd: 116

Host info
3.168.248.89.in-addr.arpa domain name pointer security.criminalip.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
3.168.248.89.in-addr.arpa	name = security.criminalip.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
91.185.236.239 attackspambots
Autoban   91.185.236.239 AUTH/CONNECT
2019-08-05 13:11:02
120.52.9.102 attackspam
Aug  5 01:29:52 TORMINT sshd\[1637\]: Invalid user 123456 from 120.52.9.102
Aug  5 01:29:52 TORMINT sshd\[1637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.9.102
Aug  5 01:29:54 TORMINT sshd\[1637\]: Failed password for invalid user 123456 from 120.52.9.102 port 53714 ssh2
...
2019-08-05 13:44:04
76.186.81.229 attackbots
Aug  5 00:50:41 ArkNodeAT sshd\[15545\]: Invalid user test from 76.186.81.229
Aug  5 00:50:41 ArkNodeAT sshd\[15545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.186.81.229
Aug  5 00:50:43 ArkNodeAT sshd\[15545\]: Failed password for invalid user test from 76.186.81.229 port 33483 ssh2
2019-08-05 13:21:21
35.185.239.108 attackbotsspam
Aug  5 01:02:22 vps647732 sshd[9896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.185.239.108
Aug  5 01:02:24 vps647732 sshd[9896]: Failed password for invalid user customercare from 35.185.239.108 port 60852 ssh2
...
2019-08-05 13:17:13
91.197.17.167 attackspam
Autoban   91.197.17.167 AUTH/CONNECT
2019-08-05 13:05:09
51.83.72.243 attackspam
2019-08-05T01:05:58.538469abusebot-8.cloudsearch.cf sshd\[32515\]: Invalid user operador from 51.83.72.243 port 41582
2019-08-05 13:24:02
176.110.130.150 attackbots
email spam
2019-08-05 13:14:50
91.138.201.202 attackbotsspam
Autoban   91.138.201.202 AUTH/CONNECT
2019-08-05 13:18:32
89.66.59.43 attackspam
Autoban   89.66.59.43 AUTH/CONNECT
2019-08-05 13:42:32
91.132.173.135 attackbotsspam
Autoban   91.132.173.135 AUTH/CONNECT
2019-08-05 13:20:20
89.64.43.16 attack
Autoban   89.64.43.16 AUTH/CONNECT
2019-08-05 13:44:27
77.40.27.96 attack
IP: 77.40.27.96
ASN: AS12389 Rostelecom
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 5/08/2019 5:04:30 AM UTC
2019-08-05 13:09:11
179.85.157.30 attack
port scan and connect, tcp 22 (ssh)
2019-08-05 13:18:15
89.237.192.167 attackbotsspam
Autoban   89.237.192.167 AUTH/CONNECT
2019-08-05 13:55:30
91.102.231.158 attack
Autoban   91.102.231.158 AUTH/CONNECT
2019-08-05 13:28:36

Recently Reported IPs

77.247.110.66 178.128.23.162 185.220.101.65 117.165.102.152
80.14.47.171 80.11.44.112 187.67.67.232 125.76.246.102
41.169.18.58 169.197.108.206 25.210.108.4 139.9.43.28
223.220.250.173 218.23.236.17 114.252.35.61 183.82.114.15
104.228.63.173 212.58.119.126 46.174.191.30 116.228.53.173