Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.61.136.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16023
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.61.136.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 22:17:27 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 81.136.61.89.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.136.61.89.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.24.104.152 attackspambots
Oct 16 10:15:08 MK-Soft-VM5 sshd[20400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.104.152 
Oct 16 10:15:10 MK-Soft-VM5 sshd[20400]: Failed password for invalid user yuvraj from 118.24.104.152 port 50622 ssh2
...
2019-10-16 17:05:52
185.209.0.51 attackspambots
10/16/2019-05:20:36.018484 185.209.0.51 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-16 17:28:30
92.63.194.115 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 94 - port: 44578 proto: TCP cat: Misc Attack
2019-10-16 17:37:23
94.177.240.170 attackspam
2019-10-16 H=\(mail.mogioan.ga\) \[94.177.240.170\] F=\ rejected RCPT \<**REMOVED****REMOVED****REMOVED**_perl@**REMOVED**.de\>: recipient blacklisted
2019-10-16 H=\(mail.mogioan.ga\) \[94.177.240.170\] F=\ rejected RCPT \<**REMOVED****REMOVED****REMOVED**_perl@**REMOVED**.de\>: recipient blacklisted
2019-10-16 H=\(mail.mogioan.ga\) \[94.177.240.170\] F=\ rejected RCPT \<**REMOVED****REMOVED****REMOVED**_perl@**REMOVED**.de\>: recipient blacklisted
2019-10-16 17:01:20
83.171.107.216 attack
Oct 16 04:52:40 firewall sshd[6321]: Invalid user postiv481 from 83.171.107.216
Oct 16 04:52:42 firewall sshd[6321]: Failed password for invalid user postiv481 from 83.171.107.216 port 5678 ssh2
Oct 16 04:57:10 firewall sshd[6439]: Invalid user oracle12#$ from 83.171.107.216
...
2019-10-16 17:12:16
122.115.230.183 attack
2019-10-16T09:05:15.672411abusebot-3.cloudsearch.cf sshd\[29593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.115.230.183  user=root
2019-10-16 17:07:25
209.126.161.108 attackbots
SMB Server BruteForce Attack
2019-10-16 17:03:43
45.136.109.253 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 17:02:33
69.94.151.22 attackbots
Postfix RBL failed
2019-10-16 17:16:47
206.189.166.172 attackbots
2019-10-16T09:50:39.792837scmdmz1 sshd\[25775\]: Invalid user applmgr from 206.189.166.172 port 33338
2019-10-16T09:50:39.800652scmdmz1 sshd\[25775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.166.172
2019-10-16T09:50:41.596816scmdmz1 sshd\[25775\]: Failed password for invalid user applmgr from 206.189.166.172 port 33338 ssh2
...
2019-10-16 17:30:44
103.44.50.114 attack
email spam
2019-10-16 17:00:52
175.211.116.226 attackbots
2019-10-16T09:24:53.901041abusebot-5.cloudsearch.cf sshd\[19518\]: Invalid user robert from 175.211.116.226 port 52106
2019-10-16 17:36:39
93.100.237.144 attack
[portscan] Port scan
2019-10-16 17:15:58
202.129.29.135 attack
Oct 16 10:49:47 server sshd\[10956\]: Failed password for invalid user ekoprasetyo from 202.129.29.135 port 36235 ssh2
Oct 16 10:52:55 server sshd\[12119\]: Invalid user ekoprasetyo from 202.129.29.135
Oct 16 10:52:55 server sshd\[12119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.29.135 
Oct 16 10:52:57 server sshd\[12119\]: Failed password for invalid user ekoprasetyo from 202.129.29.135 port 36997 ssh2
Oct 16 10:57:37 server sshd\[13714\]: Invalid user p4$$w0rd123456789 from 202.129.29.135
Oct 16 10:57:37 server sshd\[13714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.29.135 
Oct 16 10:57:39 server sshd\[13714\]: Failed password for invalid user p4$$w0rd123456789 from 202.129.29.135 port 56146 ssh2
Oct 16 10:59:06 server sshd\[14075\]: Invalid user qazwsx from 202.129.29.135
Oct 16 10:59:06 server sshd\[14075\]: pam_unix\(sshd:auth\): authentication failure\; logname= ui
...
2019-10-16 17:26:22
108.52.164.69 attackbotsspam
2019-10-16T03:55:12.690683abusebot-4.cloudsearch.cf sshd\[31855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-108-52-164-69.phlapa.fios.verizon.net  user=root
2019-10-16 17:32:29

Recently Reported IPs

195.143.92.212 33.25.244.150 7.5.169.193 186.161.52.234
46.100.52.132 181.85.116.153 172.163.123.28 88.254.80.94
231.80.41.220 215.62.129.230 16.168.114.67 56.57.19.23
244.103.230.43 248.36.42.118 41.226.246.70 172.120.78.254
108.54.212.102 24.57.1.114 72.4.157.233 118.54.252.120