Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.48.162.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53783
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.48.162.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 15:50:09 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 66.162.48.89.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.162.48.89.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.163.104.75 attack
188.163.104.75 - - [29/Jun/2020:00:34:25 +0100] "POST /wp-login.php HTTP/1.1" 200 2065 "https://therockpool.org/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.143 Safari/537.36"
188.163.104.75 - - [29/Jun/2020:00:34:26 +0100] "POST /wp-login.php HTTP/1.1" 200 2065 "https://therockpool.org/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.143 Safari/537.36"
188.163.104.75 - - [29/Jun/2020:00:43:40 +0100] "POST /wp-login.php HTTP/1.1" 200 2065 "https://therockpool.org/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.143 Safari/537.36"
...
2020-06-29 07:53:40
182.156.244.214 attack
1433/tcp 445/tcp...
[2020-06-02/28]5pkt,2pt.(tcp)
2020-06-29 07:58:36
36.155.115.72 attack
SSH Invalid Login
2020-06-29 07:53:12
140.143.211.45 attack
Jun 28 22:36:06 host sshd[32648]: Invalid user carlos from 140.143.211.45 port 33810
...
2020-06-29 07:31:21
206.189.44.246 attackspambots
2020-06-28T23:26:33.209095shield sshd\[3912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.44.246  user=root
2020-06-28T23:26:35.066869shield sshd\[3912\]: Failed password for root from 206.189.44.246 port 55694 ssh2
2020-06-28T23:27:41.950437shield sshd\[4215\]: Invalid user admin from 206.189.44.246 port 43404
2020-06-28T23:27:41.955759shield sshd\[4215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.44.246
2020-06-28T23:27:44.476860shield sshd\[4215\]: Failed password for invalid user admin from 206.189.44.246 port 43404 ssh2
2020-06-29 07:32:18
213.59.194.242 attackspam
Unauthorized connection attempt: SRC=213.59.194.242
...
2020-06-29 07:51:17
192.185.219.16 attack
C1,WP GET /suche/wp-login.php
2020-06-29 08:05:39
62.140.250.122 attackspam
Port probing on unauthorized port 1433
2020-06-29 07:52:47
194.26.29.32 attack
Jun 29 01:19:09 debian-2gb-nbg1-2 kernel: \[15644995.165438\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.32 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=47397 PROTO=TCP SPT=53928 DPT=4316 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-29 07:30:00
180.167.225.118 attack
Brute-force attempt banned
2020-06-29 07:44:17
186.4.242.37 attackspambots
Jun 28 22:46:54 srv-ubuntu-dev3 sshd[78215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.242.37  user=root
Jun 28 22:46:56 srv-ubuntu-dev3 sshd[78215]: Failed password for root from 186.4.242.37 port 52936 ssh2
Jun 28 22:48:47 srv-ubuntu-dev3 sshd[78464]: Invalid user user1 from 186.4.242.37
Jun 28 22:48:47 srv-ubuntu-dev3 sshd[78464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.242.37
Jun 28 22:48:47 srv-ubuntu-dev3 sshd[78464]: Invalid user user1 from 186.4.242.37
Jun 28 22:48:50 srv-ubuntu-dev3 sshd[78464]: Failed password for invalid user user1 from 186.4.242.37 port 37268 ssh2
Jun 28 22:52:26 srv-ubuntu-dev3 sshd[79006]: Invalid user user01 from 186.4.242.37
...
2020-06-29 07:25:59
218.39.217.92 attackbots
Unauthorized connection attempt detected from IP address 218.39.217.92 to port 23
2020-06-29 07:56:49
114.34.34.28 attackspambots
8080/tcp 60001/tcp 23/tcp...
[2020-04-29/06-28]4pkt,4pt.(tcp)
2020-06-29 07:59:18
31.24.204.71 attackbots
Brute forcing RDP port 3389
2020-06-29 07:30:26
111.229.31.144 attack
Unauthorized connection attempt detected from IP address 111.229.31.144 to port 6885
2020-06-29 07:29:35

Recently Reported IPs

4.213.40.102 54.76.100.67 104.41.170.22 108.117.231.212
84.181.241.62 71.167.200.59 156.243.163.61 249.63.15.102
167.9.225.65 114.197.133.170 116.226.110.45 204.79.149.67
68.191.50.38 180.189.246.48 15.3.146.240 128.3.248.238
128.41.30.219 201.182.116.103 191.211.51.32 32.5.126.221