Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.54.141.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.54.141.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:06:04 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 196.141.54.89.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.141.54.89.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.198.5.79 attack
Invalid user sonja from 139.198.5.79 port 43488
2020-04-25 16:33:29
104.47.66.33 attackbots
Email received from this ip address, user name of Nari Yashar [okndwightqf@hotmail.com], threatening extortion money to be paid using Bitcoin.... If I find this SOB, he had better watch his back....
2020-04-25 16:04:42
102.65.156.237 attackbots
web-1 [ssh] SSH Attack
2020-04-25 16:06:00
123.124.21.253 attackspam
Port probing on unauthorized port 1433
2020-04-25 16:43:10
107.180.227.163 attackspambots
Unauthorized connection attempt detected, IP banned.
2020-04-25 16:45:06
104.168.248.155 attack
US - - [24/Apr/2020:19:09:50 +0300] POST /wp-login.php HTTP/1.1 200 4795 - Mozilla/5.0 X11; Ubuntu; Linux x86_64; rv:62.0 Gecko/20100101 Firefox/62.0
2020-04-25 16:46:39
109.174.115.198 attackbotsspam
RU - - [24/Apr/2020:19:21:52 +0300] POST /wp-login.php HTTP/1.1 200 4813 http://science-review.com/wp-login.php Mozilla/5.0 Windows NT 6.0; rv:34.0 Gecko/20100101 Firefox/34.0
2020-04-25 16:38:51
119.96.171.162 attack
Invalid user user3 from 119.96.171.162 port 38722
2020-04-25 16:11:18
176.123.6.48 attack
(sshd) Failed SSH login from 176.123.6.48 (MD/Republic of Moldova/init-in-dollarde.cnndy.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 25 07:30:19 amsweb01 sshd[16638]: Invalid user ubnt from 176.123.6.48 port 37354
Apr 25 07:30:21 amsweb01 sshd[16638]: Failed password for invalid user ubnt from 176.123.6.48 port 37354 ssh2
Apr 25 07:30:21 amsweb01 sshd[16640]: User admin from 176.123.6.48 not allowed because not listed in AllowUsers
Apr 25 07:30:21 amsweb01 sshd[16640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.123.6.48  user=admin
Apr 25 07:30:24 amsweb01 sshd[16640]: Failed password for invalid user admin from 176.123.6.48 port 39672 ssh2
2020-04-25 16:37:32
50.63.161.42 attack
MYH,DEF GET /wp-login.php
2020-04-25 16:22:46
188.166.172.189 attackspam
SSH brutforce
2020-04-25 16:06:25
51.83.129.45 attackbots
2020-04-25T07:25:27.931245homeassistant sshd[17509]: Invalid user gdm from 51.83.129.45 port 36654
2020-04-25T07:25:27.944067homeassistant sshd[17509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.129.45
...
2020-04-25 16:19:37
222.186.180.41 attackspam
2020-04-25T07:47:30.655638shield sshd\[25552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
2020-04-25T07:47:32.822629shield sshd\[25552\]: Failed password for root from 222.186.180.41 port 47092 ssh2
2020-04-25T07:47:36.139439shield sshd\[25552\]: Failed password for root from 222.186.180.41 port 47092 ssh2
2020-04-25T07:47:38.525933shield sshd\[25552\]: Failed password for root from 222.186.180.41 port 47092 ssh2
2020-04-25T07:47:41.519653shield sshd\[25552\]: Failed password for root from 222.186.180.41 port 47092 ssh2
2020-04-25 16:08:07
119.29.16.76 attack
SSH bruteforce
2020-04-25 16:35:52
150.223.17.95 attack
Apr 25 09:55:04 mail sshd[20366]: Failed password for root from 150.223.17.95 port 57191 ssh2
Apr 25 09:56:42 mail sshd[20695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.17.95
Apr 25 09:56:44 mail sshd[20695]: Failed password for invalid user ubuntu from 150.223.17.95 port 37601 ssh2
2020-04-25 16:12:11

Recently Reported IPs

127.121.148.165 162.228.65.86 176.107.37.124 83.194.43.205
219.191.37.169 56.177.66.65 127.159.222.238 7.47.234.203
189.39.229.188 191.254.27.53 132.46.127.219 56.164.215.112
201.224.21.199 177.117.117.138 200.53.47.160 236.103.235.44
77.56.235.12 205.66.180.14 28.84.195.84 107.217.137.183