Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.85.82.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13350
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;19.85.82.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:36:20 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 53.82.85.19.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.82.85.19.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.93.20.248 attackspambots
Port scan denied
2020-06-01 03:43:35
222.174.57.170 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-01 03:51:27
154.16.171.186 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-01 03:35:55
92.53.65.40 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 88 - port: 3717 proto: TCP cat: Misc Attack
2020-06-01 03:40:34
51.91.68.39 attack
Port scan denied
2020-06-01 03:48:27
64.227.24.206 attackspambots
Port scan denied
2020-06-01 03:46:43
109.244.18.230 attack
 TCP (SYN) 109.244.18.230:60317 -> port 1433, len 52
2020-06-01 04:03:29
94.102.51.95 attack
Port scan on 13 port(s): 2710 9705 11473 17528 24163 29454 35033 52794 52834 59232 60551 62303 65045
2020-06-01 04:05:55
46.21.101.144 attackbots
 TCP (SYN) 46.21.101.144:41316 -> port 445, len 44
2020-06-01 03:49:25
141.98.81.138 attackbotsspam
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2020-06-01 04:02:14
49.88.112.109 attack
Port scan denied
2020-06-01 03:48:59
103.145.12.125 attackbots
[2020-05-31 15:50:24] NOTICE[1157] chan_sip.c: Registration from '"8012" ' failed for '103.145.12.125:5828' - Wrong password
[2020-05-31 15:50:24] SECURITY[1173] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-05-31T15:50:24.235-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="8012",SessionID="0x7f5f10678288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.125/5828",Challenge="68b466f8",ReceivedChallenge="68b466f8",ReceivedHash="c5cdbd7f257e3975ef4596b5f483d23b"
[2020-05-31 15:50:24] NOTICE[1157] chan_sip.c: Registration from '"8012" ' failed for '103.145.12.125:5828' - Wrong password
[2020-05-31 15:50:24] SECURITY[1173] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-05-31T15:50:24.465-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="8012",SessionID="0x7f5f10227d48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP
...
2020-06-01 04:04:25
51.178.78.154 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 36 - port: 6379 proto: TCP cat: Misc Attack
2020-06-01 03:48:14
92.63.197.70 attackspam
3383/tcp 3382/tcp 3380/tcp...≡ [3380/tcp,3400/tcp]
[2020-05-23/30]332pkt,21pt.(tcp)
2020-06-01 03:39:44
93.174.93.195 attack
05/31/2020-15:51:59.614940 93.174.93.195 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-06-01 04:07:09

Recently Reported IPs

162.110.99.157 84.108.6.131 218.42.56.160 192.171.188.110
230.43.138.194 219.125.228.179 65.233.252.7 208.75.12.222
180.56.229.247 155.9.106.1 140.227.4.18 145.33.77.120
36.10.240.197 131.154.92.148 199.197.171.41 195.156.158.53
42.187.131.169 242.207.116.61 79.196.254.11 10.134.156.9