Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.12.85.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.12.85.197.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 07:43:17 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 197.85.12.199.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.85.12.199.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.194.30.232 attack
Automatic report - Port Scan Attack
2019-07-26 10:14:55
82.135.198.252 attackbots
Jul 26 01:54:40 MK-Soft-VM3 sshd\[14094\]: Invalid user ap from 82.135.198.252 port 48111
Jul 26 01:54:40 MK-Soft-VM3 sshd\[14094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.135.198.252
Jul 26 01:54:42 MK-Soft-VM3 sshd\[14094\]: Failed password for invalid user ap from 82.135.198.252 port 48111 ssh2
...
2019-07-26 10:00:13
178.128.114.248 attackspam
" "
2019-07-26 09:37:15
132.148.47.241 attack
fail2ban honeypot
2019-07-26 09:45:50
74.91.116.190 attackbotsspam
2019-07-26T01:52:34.341541abusebot.cloudsearch.cf sshd\[20963\]: Invalid user li from 74.91.116.190 port 41030
2019-07-26 09:56:15
34.73.196.179 attackspambots
Automatic report - Banned IP Access
2019-07-26 09:49:37
176.153.75.234 attackbotsspam
Automatic report - Port Scan Attack
2019-07-26 10:06:25
36.189.253.226 attackspambots
Jul 26 04:10:53 vps691689 sshd[20581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.253.226
Jul 26 04:10:55 vps691689 sshd[20581]: Failed password for invalid user noc from 36.189.253.226 port 48659 ssh2
Jul 26 04:11:49 vps691689 sshd[20597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.253.226
...
2019-07-26 10:17:31
202.29.98.39 attack
Jul 25 21:45:51 vps200512 sshd\[23384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.98.39  user=root
Jul 25 21:45:53 vps200512 sshd\[23384\]: Failed password for root from 202.29.98.39 port 49940 ssh2
Jul 25 21:53:41 vps200512 sshd\[23598\]: Invalid user diag from 202.29.98.39
Jul 25 21:53:41 vps200512 sshd\[23598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.98.39
Jul 25 21:53:43 vps200512 sshd\[23598\]: Failed password for invalid user diag from 202.29.98.39 port 43742 ssh2
2019-07-26 10:01:05
47.107.38.51 attackspam
DATE:2019-07-26 01:05:47, IP:47.107.38.51, PORT:ssh brute force auth on SSH service (patata)
2019-07-26 10:24:41
200.52.80.34 attackspam
Jul 26 03:14:34 MK-Soft-Root1 sshd\[25948\]: Invalid user samantha from 200.52.80.34 port 33334
Jul 26 03:14:34 MK-Soft-Root1 sshd\[25948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
Jul 26 03:14:36 MK-Soft-Root1 sshd\[25948\]: Failed password for invalid user samantha from 200.52.80.34 port 33334 ssh2
...
2019-07-26 10:04:42
139.59.87.250 attackspambots
Jul 26 03:14:05 * sshd[27486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.87.250
Jul 26 03:14:07 * sshd[27486]: Failed password for invalid user leagsoft from 139.59.87.250 port 34450 ssh2
2019-07-26 10:03:43
23.129.64.209 attackbotsspam
SSH invalid-user multiple login try
2019-07-26 10:26:43
116.196.94.108 attackspam
Jul 25 21:58:54 xtremcommunity sshd\[27338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.94.108  user=root
Jul 25 21:58:56 xtremcommunity sshd\[27338\]: Failed password for root from 116.196.94.108 port 46956 ssh2
Jul 25 22:01:15 xtremcommunity sshd\[31840\]: Invalid user usuario2 from 116.196.94.108 port 41106
Jul 25 22:01:15 xtremcommunity sshd\[31840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.94.108
Jul 25 22:01:16 xtremcommunity sshd\[31840\]: Failed password for invalid user usuario2 from 116.196.94.108 port 41106 ssh2
...
2019-07-26 10:07:41
104.211.39.100 attackspam
Jul 26 03:17:29 SilenceServices sshd[8984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.39.100
Jul 26 03:17:31 SilenceServices sshd[8984]: Failed password for invalid user oracle from 104.211.39.100 port 48262 ssh2
Jul 26 03:21:52 SilenceServices sshd[14374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.39.100
2019-07-26 09:39:32

Recently Reported IPs

191.74.129.126 39.248.116.16 132.120.78.191 23.157.2.211
80.52.60.238 188.147.54.89 84.122.124.63 214.58.154.83
174.138.218.190 80.106.162.148 18.96.222.102 219.160.128.172
101.170.71.120 231.27.142.227 40.151.202.5 252.120.202.188
196.45.122.179 177.22.162.125 172.232.64.23 45.191.152.85