Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.53.52.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.53.52.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 20:34:29 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 104.52.53.89.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.52.53.89.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.57.109.97 attack
trying to access non-authorized port
2020-05-04 06:30:56
189.46.93.81 attackspambots
1588538343 - 05/03/2020 22:39:03 Host: 189.46.93.81/189.46.93.81 Port: 445 TCP Blocked
2020-05-04 06:02:08
187.67.5.198 attackbotsspam
" "
2020-05-04 06:12:33
211.157.2.92 attackbots
May  3 23:59:34 home sshd[30411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.2.92
May  3 23:59:36 home sshd[30411]: Failed password for invalid user demo from 211.157.2.92 port 60037 ssh2
May  4 00:02:50 home sshd[31321]: Failed password for root from 211.157.2.92 port 23046 ssh2
...
2020-05-04 06:18:55
118.25.6.53 attackbotsspam
SSH Invalid Login
2020-05-04 06:36:09
120.53.24.140 attackspambots
May  3 23:41:44 ArkNodeAT sshd\[8886\]: Invalid user test from 120.53.24.140
May  3 23:41:44 ArkNodeAT sshd\[8886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.24.140
May  3 23:41:46 ArkNodeAT sshd\[8886\]: Failed password for invalid user test from 120.53.24.140 port 60606 ssh2
2020-05-04 06:06:45
123.206.47.228 attackbots
2020-05-03T23:49:55.009097vps773228.ovh.net sshd[11149]: Invalid user osm from 123.206.47.228 port 51220
2020-05-03T23:49:55.018018vps773228.ovh.net sshd[11149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.47.228
2020-05-03T23:49:55.009097vps773228.ovh.net sshd[11149]: Invalid user osm from 123.206.47.228 port 51220
2020-05-03T23:49:56.853535vps773228.ovh.net sshd[11149]: Failed password for invalid user osm from 123.206.47.228 port 51220 ssh2
2020-05-03T23:51:48.388742vps773228.ovh.net sshd[11224]: Invalid user stephany from 123.206.47.228 port 46820
...
2020-05-04 06:11:01
46.101.206.205 attackspam
SSH Invalid Login
2020-05-04 06:06:01
157.55.39.14 attack
Automatic report - Banned IP Access
2020-05-04 06:14:31
113.88.137.250 attackspam
May  4 00:06:10 home sshd[32094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.88.137.250
May  4 00:06:12 home sshd[32094]: Failed password for invalid user ww from 113.88.137.250 port 48512 ssh2
May  4 00:11:01 home sshd[938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.88.137.250
...
2020-05-04 06:28:45
68.183.35.255 attackspambots
May  3 23:17:28 sxvn sshd[598598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.35.255
2020-05-04 06:17:55
45.142.195.6 attackspam
May  4 00:20:05 srv01 postfix/smtpd\[6538\]: warning: unknown\[45.142.195.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  4 00:20:19 srv01 postfix/smtpd\[6560\]: warning: unknown\[45.142.195.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  4 00:20:25 srv01 postfix/smtpd\[6538\]: warning: unknown\[45.142.195.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  4 00:20:31 srv01 postfix/smtpd\[6427\]: warning: unknown\[45.142.195.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  4 00:21:14 srv01 postfix/smtpd\[6538\]: warning: unknown\[45.142.195.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-04 06:21:19
190.207.41.53 attackspam
Unauthorised access (May  3) SRC=190.207.41.53 LEN=52 TTL=117 ID=27691 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-04 06:20:12
54.93.232.223 attackbots
20 attempts against mh-misbehave-ban on cell
2020-05-04 06:19:30
37.152.178.44 attackspambots
SSH Brute-Force Attack
2020-05-04 06:18:21

Recently Reported IPs

209.232.169.225 224.226.48.159 189.50.62.166 34.92.166.198
167.174.55.39 155.11.35.238 161.224.49.2 59.227.221.63
51.109.163.167 118.176.243.164 186.74.33.66 134.250.7.200
60.74.241.231 152.55.83.122 251.137.155.246 78.141.26.45
193.26.113.86 161.118.61.217 23.38.93.203 57.207.121.251