Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
89.248.172.16 attack
Bap IP
2024-05-12 23:39:04
89.248.172.140 attackbots
Automatic report - Port Scan
2020-10-13 20:36:52
89.248.172.140 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 80 - port: 2468 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 12:08:47
89.248.172.140 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 7110 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 04:58:27
89.248.172.16 attack
ET DROP Dshield Block Listed Source group 1 - port: 60001 proto: tcp cat: Misc Attackbytes: 60
2020-10-11 03:06:34
89.248.172.16 attackspambots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-10 18:56:46
89.248.172.16 attackbotsspam
- Port=2081
2020-10-08 03:13:38
89.248.172.16 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 78 - port: 8089 proto: tcp cat: Misc Attackbytes: 60
2020-10-07 19:27:51
89.248.172.85 attackbots
scans 5 times in preceeding hours on the ports (in chronological order) 28589 10777 30026 10201 30103 resulting in total of 70 scans from 89.248.160.0-89.248.174.255 block.
2020-10-01 07:13:00
89.248.172.140 attack
scans 10 times in preceeding hours on the ports (in chronological order) 2728 4590 4446 3410 20222 1983 5656 6300 2728 3031 resulting in total of 70 scans from 89.248.160.0-89.248.174.255 block.
2020-10-01 06:47:26
89.248.172.85 attack
 TCP (SYN) 89.248.172.85:50104 -> port 30009, len 44
2020-09-30 23:39:40
89.248.172.140 attackspam
 TCP (SYN) 89.248.172.140:44912 -> port 3410, len 44
2020-09-30 23:10:43
89.248.172.140 attack
firewall-block, port(s): 1983/tcp, 3450/tcp, 5656/tcp
2020-09-30 15:44:03
89.248.172.140 attackbots
 TCP (SYN) 89.248.172.140:47677 -> port 2000, len 44
2020-09-21 20:38:47
89.248.172.140 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 5566 proto: tcp cat: Misc Attackbytes: 60
2020-09-21 12:30:09
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.248.172.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48393
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.248.172.166.			IN	A

;; AUTHORITY SECTION:
.			509	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091400 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 14 22:13:40 CST 2022
;; MSG SIZE  rcvd: 107
Host info
166.172.248.89.in-addr.arpa domain name pointer no-reverse-dns-configured.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.172.248.89.in-addr.arpa	name = no-reverse-dns-configured.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.9.39.96 attackbotsspam
Scanning and Vuln Attempts
2019-07-05 22:20:52
37.183.34.253 attackbots
''
2019-07-05 22:51:19
165.225.106.137 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 06:43:07,559 INFO [shellcode_manager] (165.225.106.137) no match, writing hexdump (ab51b4ccbf36b7b0b26b5cbecf379766 :13031) - SMB (Unknown)
2019-07-05 22:43:32
198.108.67.34 attack
Port scan: Attack repeated for 24 hours
2019-07-05 22:17:38
152.231.108.67 attack
Unauthorized connection attempt from IP address 152.231.108.67 on Port 445(SMB)
2019-07-05 22:50:55
121.61.146.249 attackbots
Jul  5 03:54:47 esmtp postfix/smtpd[11190]: lost connection after AUTH from unknown[121.61.146.249]
Jul  5 03:54:49 esmtp postfix/smtpd[11207]: lost connection after AUTH from unknown[121.61.146.249]
Jul  5 03:54:53 esmtp postfix/smtpd[11210]: lost connection after AUTH from unknown[121.61.146.249]
Jul  5 03:54:55 esmtp postfix/smtpd[11190]: lost connection after AUTH from unknown[121.61.146.249]
Jul  5 03:54:58 esmtp postfix/smtpd[11210]: lost connection after AUTH from unknown[121.61.146.249]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=121.61.146.249
2019-07-05 23:05:06
202.78.200.166 attackspambots
Scanning and Vuln Attempts
2019-07-05 22:24:40
1.232.77.64 attackbotsspam
Jul  5 14:55:55 cp sshd[27026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.232.77.64
Jul  5 14:55:56 cp sshd[27028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.232.77.64
Jul  5 14:55:57 cp sshd[27028]: Failed password for invalid user pi from 1.232.77.64 port 46374 ssh2
2019-07-05 22:53:15
198.108.67.83 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-05 22:46:27
202.108.1.142 attack
Scanning and Vuln Attempts
2019-07-05 22:32:22
198.108.67.99 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-05 23:00:46
200.233.212.22 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 09:32:39,313 INFO [amun_request_handler] PortScan Detected on Port: 445 (200.233.212.22)
2019-07-05 22:14:24
118.24.216.148 attack
Jul  5 13:31:33 bouncer sshd\[15814\]: Invalid user bienvenue from 118.24.216.148 port 57780
Jul  5 13:31:33 bouncer sshd\[15814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.216.148 
Jul  5 13:31:36 bouncer sshd\[15814\]: Failed password for invalid user bienvenue from 118.24.216.148 port 57780 ssh2
...
2019-07-05 22:14:00
198.20.87.98 attackspambots
05.07.2019 09:06:09 HTTPs access blocked by firewall
2019-07-05 23:08:33
200.73.14.196 attackbotsspam
Scanning and Vuln Attempts
2019-07-05 22:40:50

Recently Reported IPs

176.121.14.42 89.248.172.160 89.248.172.138 89.248.172.132
89.248.172.161 89.248.172.163 192.53.172.197 167.94.146.1
5.182.39.125 181.174.164.49 45.148.10.151 167.94.146.93
167.94.146.8 92.118.160.147 92.118.160.248 167.94.145.43
93.174.89.108 169.54.244.79 169.45.161.187 169.45.161.182