Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: White Bear Lake

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.46.85.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;199.46.85.42.			IN	A

;; AUTHORITY SECTION:
.			236	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100200 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 02 17:51:10 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 42.85.46.199.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 42.85.46.199.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
147.135.208.234 attackspambots
Invalid user ftpuser from 147.135.208.234 port 45450
2020-04-21 20:41:27
118.89.108.152 attackspam
Apr 21 09:00:32 firewall sshd[19289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.152
Apr 21 09:00:32 firewall sshd[19289]: Invalid user wt from 118.89.108.152
Apr 21 09:00:34 firewall sshd[19289]: Failed password for invalid user wt from 118.89.108.152 port 52298 ssh2
...
2020-04-21 20:53:56
129.158.74.141 attack
Invalid user su from 129.158.74.141 port 39495
2020-04-21 20:48:26
76.120.7.86 attackspam
(sshd) Failed SSH login from 76.120.7.86 (US/United States/c-76-120-7-86.hsd1.co.comcast.net): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 21 15:00:41 ubnt-55d23 sshd[31881]: Invalid user oq from 76.120.7.86 port 60332
Apr 21 15:00:43 ubnt-55d23 sshd[31881]: Failed password for invalid user oq from 76.120.7.86 port 60332 ssh2
2020-04-21 21:10:29
142.93.60.53 attackbotsspam
Invalid user test from 142.93.60.53 port 37028
2020-04-21 20:41:53
103.90.188.171 attack
Apr 21 14:51:44 [host] sshd[28003]: Invalid user a
Apr 21 14:51:44 [host] sshd[28003]: pam_unix(sshd:
Apr 21 14:51:46 [host] sshd[28003]: Failed passwor
2020-04-21 21:03:22
123.207.157.120 attack
Invalid user a from 123.207.157.120 port 57732
2020-04-21 20:50:21
122.14.195.58 attack
2020-04-21T12:09:11.093331abusebot-7.cloudsearch.cf sshd[23277]: Invalid user test from 122.14.195.58 port 41064
2020-04-21T12:09:11.109493abusebot-7.cloudsearch.cf sshd[23277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.195.58
2020-04-21T12:09:11.093331abusebot-7.cloudsearch.cf sshd[23277]: Invalid user test from 122.14.195.58 port 41064
2020-04-21T12:09:13.557688abusebot-7.cloudsearch.cf sshd[23277]: Failed password for invalid user test from 122.14.195.58 port 41064 ssh2
2020-04-21T12:15:46.094317abusebot-7.cloudsearch.cf sshd[23617]: Invalid user ay from 122.14.195.58 port 46888
2020-04-21T12:15:46.100018abusebot-7.cloudsearch.cf sshd[23617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.195.58
2020-04-21T12:15:46.094317abusebot-7.cloudsearch.cf sshd[23617]: Invalid user ay from 122.14.195.58 port 46888
2020-04-21T12:15:48.106803abusebot-7.cloudsearch.cf sshd[23617]: Failed password
...
2020-04-21 20:53:28
92.50.249.166 attackbotsspam
Invalid user pv from 92.50.249.166 port 43786
2020-04-21 21:05:47
114.202.139.173 attackbots
Invalid user up from 114.202.139.173 port 42050
2020-04-21 20:55:54
137.74.171.160 attackspam
Invalid user hn from 137.74.171.160 port 45892
2020-04-21 20:44:26
122.51.40.146 attack
Apr 21 14:11:41 ns3164893 sshd[3814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.40.146
Apr 21 14:11:43 ns3164893 sshd[3814]: Failed password for invalid user hadoop from 122.51.40.146 port 49232 ssh2
...
2020-04-21 20:53:09
114.67.69.206 attackspam
Invalid user test3 from 114.67.69.206 port 55234
2020-04-21 20:56:06
138.68.94.173 attackbotsspam
Apr 21 04:55:36 mockhub sshd[31698]: Failed password for root from 138.68.94.173 port 40550 ssh2
...
2020-04-21 20:43:12
110.43.50.221 attack
Invalid user admin from 110.43.50.221 port 46902
2020-04-21 20:58:03

Recently Reported IPs

202.50.65.150 89.79.96.197 27.99.92.110 103.232.7.43
145.55.209.224 206.143.125.68 142.144.211.221 222.126.232.183
97.141.89.135 20.196.80.243 87.15.45.170 159.68.150.1
3.199.98.24 188.228.90.173 107.51.136.175 183.99.9.91
210.155.215.148 1.178.244.17 39.33.226.83 92.241.73.251