Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.64.85.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65138
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.64.85.199.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 05:31:28 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 199.85.64.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 199.85.64.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.58.130.198 attack
1584536888 - 03/18/2020 14:08:08 Host: 5.58.130.198/5.58.130.198 Port: 445 TCP Blocked
2020-03-19 02:35:04
94.191.20.179 attackbotsspam
Mar 18 09:07:11 Tower sshd[22983]: Connection from 94.191.20.179 port 37880 on 192.168.10.220 port 22 rdomain ""
Mar 18 09:07:14 Tower sshd[22983]: Failed password for root from 94.191.20.179 port 37880 ssh2
Mar 18 09:07:15 Tower sshd[22983]: Received disconnect from 94.191.20.179 port 37880:11: Bye Bye [preauth]
Mar 18 09:07:15 Tower sshd[22983]: Disconnected from authenticating user root 94.191.20.179 port 37880 [preauth]
2020-03-19 03:05:58
106.12.217.180 attack
Mar 18 18:25:09 prox sshd[24237]: Failed password for root from 106.12.217.180 port 52942 ssh2
2020-03-19 02:51:35
45.32.9.147 attackbotsspam
Invalid user ftptest from 45.32.9.147 port 55562
2020-03-19 03:11:27
113.184.40.133 attackbotsspam
Honeypot attack, port: 81, PTR: static.vnpt.vn.
2020-03-19 02:39:27
37.139.16.94 attackspambots
leo_www
2020-03-19 03:08:05
156.203.181.0 attackspam
20/3/18@09:07:51: FAIL: Alarm-Telnet address from=156.203.181.0
...
2020-03-19 02:56:51
189.213.147.178 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-19 02:27:52
183.77.139.175 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 17:00:39.
2020-03-19 02:59:55
80.244.36.132 attackspambots
1584536876 - 03/18/2020 14:07:56 Host: 80.244.36.132/80.244.36.132 Port: 445 TCP Blocked
2020-03-19 02:50:18
164.132.9.199 attack
Mar 16 02:28:07 h2022099 sshd[26591]: Invalid user acoustic from 164.132.9.199
Mar 16 02:28:10 h2022099 sshd[26591]: Failed password for invalid user acoustic from 164.132.9.199 port 37868 ssh2
Mar 16 02:28:12 h2022099 sshd[26591]: Failed password for invalid user acoustic from 164.132.9.199 port 37868 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=164.132.9.199
2020-03-19 02:29:43
122.117.17.48 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-19 02:49:00
77.75.37.51 attack
Mar 17 21:55:44 archiv sshd[18836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=server-77.75.37.51.radore.net.tr  user=r.r
Mar 17 21:55:46 archiv sshd[18836]: Failed password for r.r from 77.75.37.51 port 42283 ssh2
Mar 17 21:55:46 archiv sshd[18836]: Received disconnect from 77.75.37.51 port 42283:11: Bye Bye [preauth]
Mar 17 21:55:46 archiv sshd[18836]: Disconnected from 77.75.37.51 port 42283 [preauth]
Mar 17 22:10:23 archiv sshd[19177]: Invalid user takaki from 77.75.37.51 port 53790
Mar 17 22:10:23 archiv sshd[19177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=server-77.75.37.51.radore.net.tr
Mar 17 22:10:26 archiv sshd[19177]: Failed password for invalid user takaki from 77.75.37.51 port 53790 ssh2
Mar 17 22:10:26 archiv sshd[19177]: Received disconnect from 77.75.37.51 port 53790:11: Bye Bye [preauth]
Mar 17 22:10:26 archiv sshd[19177]: Disconnected from 77.75.37.51 port 5379........
-------------------------------
2020-03-19 03:06:21
61.182.232.38 attackbots
2020-03-18T18:13:29.641312randservbullet-proofcloud-66.localdomain sshd[11605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.182.232.38  user=root
2020-03-18T18:13:31.493636randservbullet-proofcloud-66.localdomain sshd[11605]: Failed password for root from 61.182.232.38 port 51350 ssh2
2020-03-18T18:34:07.518565randservbullet-proofcloud-66.localdomain sshd[11694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.182.232.38  user=root
2020-03-18T18:34:09.662012randservbullet-proofcloud-66.localdomain sshd[11694]: Failed password for root from 61.182.232.38 port 58714 ssh2
...
2020-03-19 03:01:51
176.109.17.50 attackbotsspam
" "
2020-03-19 02:59:00

Recently Reported IPs

66.55.122.34 9.69.54.238 220.245.104.187 43.219.222.113
200.98.22.130 135.118.167.27 107.11.250.206 140.202.53.21
230.20.31.236 125.17.169.92 61.57.61.235 33.77.68.48
149.96.1.185 214.197.188.96 204.1.252.154 35.22.236.88
181.53.83.30 77.245.146.166 6.179.133.116 197.242.175.12