Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.34.100.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.34.100.224.			IN	A

;; AUTHORITY SECTION:
.			285	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020101 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 02 05:28:04 CST 2022
;; MSG SIZE  rcvd: 106
Host info
224.100.34.89.in-addr.arpa domain name pointer orchiddept.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
224.100.34.89.in-addr.arpa	name = orchiddept.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.182 attack
2019-11-16T20:00:14.730911hub.schaetter.us sshd\[28543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2019-11-16T20:00:16.409629hub.schaetter.us sshd\[28543\]: Failed password for root from 222.186.175.182 port 9608 ssh2
2019-11-16T20:00:20.049697hub.schaetter.us sshd\[28543\]: Failed password for root from 222.186.175.182 port 9608 ssh2
2019-11-16T20:00:23.557859hub.schaetter.us sshd\[28543\]: Failed password for root from 222.186.175.182 port 9608 ssh2
2019-11-16T20:00:27.151848hub.schaetter.us sshd\[28543\]: Failed password for root from 222.186.175.182 port 9608 ssh2
...
2019-11-17 04:01:13
114.44.121.53 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-17 03:34:49
45.143.221.17 attack
*Port Scan* detected from 45.143.221.17 (NL/Netherlands/-). 11 hits in the last 110 seconds
2019-11-17 03:50:57
118.24.151.43 attack
Nov 16 19:36:38 vps647732 sshd[2049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.151.43
Nov 16 19:36:39 vps647732 sshd[2049]: Failed password for invalid user ident from 118.24.151.43 port 48048 ssh2
...
2019-11-17 03:40:07
104.254.92.21 attackspambots
(From jaunita.morrice@gmail.com) Would you like to post your advertisement on over 1000 ad sites every month? Pay one low monthly fee and get virtually unlimited traffic to your site forever! For more information just visit: http://www.postonthousandsofsites.xyz
2019-11-17 03:36:38
80.82.64.127 attack
11/16/2019-20:44:56.121137 80.82.64.127 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2019-11-17 03:46:41
93.151.181.242 attackbots
port scan and connect, tcp 23 (telnet)
2019-11-17 04:03:16
188.254.0.226 attackspam
Nov 16 16:14:53 124388 sshd[22792]: Failed password for root from 188.254.0.226 port 55258 ssh2
Nov 16 16:18:38 124388 sshd[22808]: Invalid user kleiser from 188.254.0.226 port 33962
Nov 16 16:18:38 124388 sshd[22808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.226
Nov 16 16:18:38 124388 sshd[22808]: Invalid user kleiser from 188.254.0.226 port 33962
Nov 16 16:18:40 124388 sshd[22808]: Failed password for invalid user kleiser from 188.254.0.226 port 33962 ssh2
2019-11-17 04:03:58
51.68.192.106 attack
2019-11-16T15:44:29.178568scmdmz1 sshd\[17285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip106.ip-51-68-192.eu  user=root
2019-11-16T15:44:32.070123scmdmz1 sshd\[17285\]: Failed password for root from 51.68.192.106 port 49490 ssh2
2019-11-16T15:47:45.646420scmdmz1 sshd\[17532\]: Invalid user backup from 51.68.192.106 port 57516
...
2019-11-17 03:57:18
124.156.218.80 attackspam
Automatic report - Banned IP Access
2019-11-17 03:38:27
14.252.139.181 attack
Nov 16 15:48:12 MK-Soft-VM3 sshd[9753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.252.139.181 
Nov 16 15:48:14 MK-Soft-VM3 sshd[9753]: Failed password for invalid user admin from 14.252.139.181 port 47099 ssh2
...
2019-11-17 03:41:28
221.194.197.96 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/221.194.197.96/ 
 
 CN - 1H : (651)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 221.194.197.96 
 
 CIDR : 221.194.0.0/16 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 10 
  3H - 20 
  6H - 43 
 12H - 131 
 24H - 247 
 
 DateTime : 2019-11-16 15:48:06 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-17 03:42:41
222.186.180.9 attackbots
Nov 16 20:55:25 icinga sshd[12072]: Failed password for root from 222.186.180.9 port 21786 ssh2
Nov 16 20:55:28 icinga sshd[12072]: Failed password for root from 222.186.180.9 port 21786 ssh2
...
2019-11-17 04:05:03
139.226.156.230 attack
firewall-block, port(s): 23/tcp
2019-11-17 03:31:41
68.183.160.63 attackbotsspam
2019-11-16T19:55:24.327166shield sshd\[21528\]: Invalid user es from 68.183.160.63 port 42698
2019-11-16T19:55:24.331150shield sshd\[21528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-16T19:55:26.531501shield sshd\[21528\]: Failed password for invalid user es from 68.183.160.63 port 42698 ssh2
2019-11-16T19:59:13.459842shield sshd\[22205\]: Invalid user es from 68.183.160.63 port 58854
2019-11-16T19:59:13.464161shield sshd\[22205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-17 04:03:29

Recently Reported IPs

118.190.45.17 116.19.121.20 103.28.84.81 50.225.199.204
35.177.70.85 116.112.76.96 221.20.239.38 155.44.185.188
32.243.85.246 162.21.98.145 80.96.25.87 215.252.52.131
6.95.123.165 91.22.31.164 112.227.152.70 4.18.65.155
254.146.236.210 134.172.182.154 96.81.113.253 93.84.139.79