Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kazakhstan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.42.204.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23147
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.42.204.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 03:32:37 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 1.204.42.89.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.204.42.89.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
68.183.55.125 attackspambots
Sep 20 22:49:39 haigwepa sshd[3419]: Failed password for root from 68.183.55.125 port 43570 ssh2
...
2020-09-21 07:07:18
202.183.198.6 attack
Unauthorized SSH login attempts
2020-09-21 07:21:52
78.139.93.236 attack
Sep 20 14:01:08 logopedia-1vcpu-1gb-nyc1-01 sshd[442968]: Failed password for root from 78.139.93.236 port 57960 ssh2
...
2020-09-21 07:17:09
187.116.137.111 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-21 07:08:53
125.41.15.66 attackspam
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=62942  .  dstport=23  .     (2318)
2020-09-21 07:27:43
222.186.42.137 attackbotsspam
Sep 20 23:26:46 rush sshd[18327]: Failed password for root from 222.186.42.137 port 31231 ssh2
Sep 20 23:26:49 rush sshd[18327]: Failed password for root from 222.186.42.137 port 31231 ssh2
Sep 20 23:26:50 rush sshd[18327]: Failed password for root from 222.186.42.137 port 31231 ssh2
...
2020-09-21 07:27:10
94.228.182.244 attackbotsspam
web-1 [ssh_2] SSH Attack
2020-09-21 06:50:54
187.108.0.241 attackbotsspam
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=49312  .  dstport=23  .     (2322)
2020-09-21 06:52:26
176.106.25.62 attackbotsspam
Sep 20 14:05:21 roki-contabo sshd\[23545\]: Invalid user guest from 176.106.25.62
Sep 20 14:05:21 roki-contabo sshd\[23545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.106.25.62
Sep 20 14:05:23 roki-contabo sshd\[23545\]: Failed password for invalid user guest from 176.106.25.62 port 39379 ssh2
Sep 20 19:01:16 roki-contabo sshd\[26139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.106.25.62  user=root
Sep 20 19:01:17 roki-contabo sshd\[26139\]: Failed password for root from 176.106.25.62 port 41998 ssh2
...
2020-09-21 07:04:59
78.27.133.197 attackbotsspam
IP 78.27.133.197 attacked honeypot on port: 22 at 9/20/2020 12:00:11 PM
2020-09-21 07:28:34
35.129.31.137 attackbots
Triggered by Fail2Ban at Ares web server
2020-09-21 07:19:10
1.64.232.79 attackbotsspam
Brute-force attempt banned
2020-09-21 07:07:46
64.225.123.85 attack
(smtpauth) Failed SMTP AUTH login from 64.225.123.85 (US/United States/-): 10 in the last 300 secs
2020-09-21 07:00:54
209.45.78.153 attack
Unauthorized connection attempt from IP address 209.45.78.153 on Port 445(SMB)
2020-09-21 07:19:45
111.161.74.106 attackspam
Invalid user admins from 111.161.74.106 port 42788
2020-09-21 06:26:26

Recently Reported IPs

236.232.104.12 145.63.157.157 187.117.105.169 189.77.95.159
94.33.226.240 124.153.3.245 188.63.212.18 136.120.253.217
209.219.193.154 85.100.107.178 193.56.171.7 231.148.41.153
87.68.185.240 87.163.91.194 208.233.29.62 200.163.104.237
110.33.96.117 98.72.249.160 179.250.255.210 18.254.79.67