Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tempe

Region: Arizona

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.169.107.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3957
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.169.107.85.			IN	A

;; AUTHORITY SECTION:
.			148	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051500 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 15 16:21:41 CST 2023
;; MSG SIZE  rcvd: 107
Host info
85.107.169.149.in-addr.arpa domain name pointer 149-169-107-85.nat.asu.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.107.169.149.in-addr.arpa	name = 149-169-107-85.nat.asu.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.222.94.46 attack
Apr 28 00:09:48 host5 sshd[5435]: Invalid user csw from 92.222.94.46 port 36994
...
2020-04-28 06:54:51
92.118.161.17 attack
9200/tcp 8082/tcp 68/tcp...
[2020-03-03/04-27]63pkt,47pt.(tcp),5pt.(udp),1tp.(icmp)
2020-04-28 06:34:40
167.71.155.236 attack
firewall-block, port(s): 22304/tcp
2020-04-28 07:02:34
185.189.14.91 attackspam
SSH auth scanning - multiple failed logins
2020-04-28 06:31:50
195.9.46.110 attackbotsspam
firewall-block, port(s): 445/tcp
2020-04-28 06:52:38
123.235.175.161 attackspambots
firewall-block, port(s): 23/tcp
2020-04-28 07:07:42
192.241.211.215 attack
Invalid user younes from 192.241.211.215 port 37618
2020-04-28 06:33:38
64.225.64.215 attackbots
Apr 27 20:33:46 XXXXXX sshd[32132]: Invalid user jing from 64.225.64.215 port 56088
2020-04-28 06:29:55
34.93.211.49 attack
Invalid user oracle from 34.93.211.49 port 45582
2020-04-28 06:31:03
134.209.155.5 attackbotsspam
firewall-block, port(s): 3320/tcp
2020-04-28 07:07:09
186.29.70.85 attackspam
2020-04-27T16:02:32.248210linuxbox-skyline sshd[4543]: Invalid user upsource from 186.29.70.85 port 46587
...
2020-04-28 06:48:44
89.248.168.217 attack
04/27/2020-16:50:40.518740 89.248.168.217 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-04-28 06:57:36
194.31.244.46 attackspambots
Multiport scan : 27 ports scanned 7581 7587 7588 7590 7591 7770 7772 7773 7774 7775 7779 7780 7781 7782 7786 7787 7788 7789 7790 7791 7792 7793 7794 7796 7797 7798 7799
2020-04-28 06:56:34
119.29.134.163 attackspambots
$f2bV_matches
2020-04-28 06:53:28
167.114.114.193 attackbots
Apr 27 22:10:28 v22018086721571380 sshd[32071]: Failed password for invalid user huang from 167.114.114.193 port 47042 ssh2
Apr 27 23:12:22 v22018086721571380 sshd[15026]: Failed password for invalid user ramiro from 167.114.114.193 port 38516 ssh2
2020-04-28 06:53:05

Recently Reported IPs

140.116.25.38 115.178.206.103 116.206.36.55 140.96.20.128
141.213.168.126 193.226.34.68 158.64.79.8 140.116.31.70
140.116.9.54 202.240.109.134 130.158.70.171 140.116.163.162
103.123.148.218 46.239.142.66 137.215.212.70 195.199.249.133
140.113.107.45 140.116.193.192 128.230.164.114 103.119.64.234