Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
116.28.52.140 attackbotsspam
52869/tcp
[2019-08-06]1pkt
2019-08-07 11:52:26
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.28.52.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49949
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.28.52.85.			IN	A

;; AUTHORITY SECTION:
.			570	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 05:04:52 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 85.52.28.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.52.28.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
194.87.138.124 attackspambots
 TCP (SYN) 194.87.138.124:45861 -> port 8080, len 40
2020-08-13 03:12:57
180.242.30.175 attackspambots
 TCP (SYN) 180.242.30.175:54066 -> port 445, len 48
2020-08-13 02:55:29
220.135.134.98 attackbotsspam
 TCP (SYN) 220.135.134.98:5959 -> port 23, len 40
2020-08-13 03:12:13
117.196.146.147 attack
 TCP (SYN) 117.196.146.147:42758 -> port 23, len 44
2020-08-13 02:58:09
151.26.127.210 attackspambots
 TCP (SYN) 151.26.127.210:55155 -> port 445, len 44
2020-08-13 02:38:58
45.177.16.129 attackbotsspam
 TCP (SYN) 45.177.16.129:53949 -> port 445, len 52
2020-08-13 02:49:20
91.241.37.146 attackbotsspam
 TCP (SYN) 91.241.37.146:15701 -> port 23, len 44
2020-08-13 03:02:46
139.211.63.234 attackspam
 TCP (SYN) 139.211.63.234:32322 -> port 8080, len 40
2020-08-13 02:56:40
182.16.157.141 attack
 TCP (SYN) 182.16.157.141:16345 -> port 23, len 40
2020-08-13 02:35:21
39.66.136.108 attack
 TCP (SYN) 39.66.136.108:44794 -> port 8080, len 40
2020-08-13 03:08:59
112.229.139.225 attack
 TCP (SYN) 112.229.139.225:50087 -> port 1433, len 40
2020-08-13 02:58:33
122.227.27.62 attack
 TCP (SYN) 122.227.27.62:53098 -> port 445, len 52
2020-08-13 02:39:16
58.228.159.253 attack
IPS Sensor Hit - Port Scan detected
2020-08-13 03:05:51
109.236.223.3 attack
 TCP (SYN) 109.236.223.3:63798 -> port 445, len 52
2020-08-13 02:59:18
131.255.152.2 attack
 TCP (SYN) 131.255.152.2:50372 -> port 1433, len 44
2020-08-13 02:56:56

Recently Reported IPs

117.195.86.254 116.28.52.87 116.28.53.109 116.28.53.147
116.28.53.144 116.28.53.63 116.28.53.95 116.28.54.108
116.28.54.11 116.28.54.153 116.28.54.161 117.195.86.3
116.28.54.182 116.28.54.200 116.28.54.209 116.28.54.245
116.28.54.220 116.28.54.250 116.28.54.42 116.28.54.48