Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.85.214.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57070
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.85.214.26.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025050802 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 09 11:44:44 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 26.214.85.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 26.214.85.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.113.219.211 attack
2020-08-02 12:36:37
109.111.237.38 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-08-02 12:44:41
210.245.92.228 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-02 12:22:27
34.87.83.116 attackspam
Tried sshing with brute force.
2020-08-02 12:53:21
182.61.130.51 attack
Aug  2 03:55:15 *** sshd[5688]: User root from 182.61.130.51 not allowed because not listed in AllowUsers
2020-08-02 12:46:38
139.59.169.103 attack
Aug  2 05:55:58 minden010 sshd[9799]: Failed password for root from 139.59.169.103 port 57130 ssh2
Aug  2 05:58:48 minden010 sshd[10733]: Failed password for root from 139.59.169.103 port 50092 ssh2
...
2020-08-02 12:28:48
182.122.16.75 attackbots
Jul 31 18:09:50 zimbra sshd[12078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.16.75  user=r.r
Jul 31 18:09:52 zimbra sshd[12078]: Failed password for r.r from 182.122.16.75 port 34504 ssh2
Jul 31 18:09:52 zimbra sshd[12078]: Received disconnect from 182.122.16.75 port 34504:11: Bye Bye [preauth]
Jul 31 18:09:52 zimbra sshd[12078]: Disconnected from 182.122.16.75 port 34504 [preauth]
Jul 31 18:12:34 zimbra sshd[14722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.16.75  user=r.r
Jul 31 18:12:37 zimbra sshd[14722]: Failed password for r.r from 182.122.16.75 port 61484 ssh2
Jul 31 18:12:37 zimbra sshd[14722]: Received disconnect from 182.122.16.75 port 61484:11: Bye Bye [preauth]
Jul 31 18:12:37 zimbra sshd[14722]: Disconnected from 182.122.16.75 port 61484 [preauth]
Jul 31 18:14:48 zimbra sshd[16504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t........
-------------------------------
2020-08-02 12:35:39
116.196.90.116 attackbotsspam
Invalid user yli from 116.196.90.116 port 52612
2020-08-02 13:00:37
190.133.138.95 attack
Automatic report - Port Scan Attack
2020-08-02 12:51:47
222.35.80.63 attackspambots
Aug  2 05:20:48 Ubuntu-1404-trusty-64-minimal sshd\[18399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.35.80.63  user=root
Aug  2 05:20:50 Ubuntu-1404-trusty-64-minimal sshd\[18399\]: Failed password for root from 222.35.80.63 port 51540 ssh2
Aug  2 05:52:19 Ubuntu-1404-trusty-64-minimal sshd\[3426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.35.80.63  user=root
Aug  2 05:52:21 Ubuntu-1404-trusty-64-minimal sshd\[3426\]: Failed password for root from 222.35.80.63 port 38812 ssh2
Aug  2 05:55:07 Ubuntu-1404-trusty-64-minimal sshd\[4246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.35.80.63  user=root
2020-08-02 12:57:58
45.127.62.55 attack
Aug  2 00:42:00 ws24vmsma01 sshd[26741]: Failed password for root from 45.127.62.55 port 39379 ssh2
...
2020-08-02 12:52:15
222.186.180.130 attack
Tried sshing with brute force.
2020-08-02 12:21:40
111.229.246.61 attackbots
$f2bV_matches
2020-08-02 12:30:41
52.17.98.131 attackbots
22 attempts against mh-misbehave-ban on shade
2020-08-02 12:42:00
139.155.43.222 attackbotsspam
Aug  2 06:22:45 vps sshd[857687]: Failed password for root from 139.155.43.222 port 51904 ssh2
Aug  2 06:23:37 vps sshd[861116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.43.222  user=root
Aug  2 06:23:39 vps sshd[861116]: Failed password for root from 139.155.43.222 port 33322 ssh2
Aug  2 06:24:32 vps sshd[864518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.43.222  user=root
Aug  2 06:24:35 vps sshd[864518]: Failed password for root from 139.155.43.222 port 43052 ssh2
...
2020-08-02 12:40:41

Recently Reported IPs

135.237.126.199 202.105.46.221 172.236.228.208 167.71.189.250
113.120.51.1 113.120.51.35 198.235.24.247 134.122.19.80
178.79.129.10 34.77.151.17 20.163.2.42 18.222.141.154
186.249.129.127 45.86.232.0 42.233.130.58 42.233.130.99
10.230.111.210 97.208.33.149 149.87.191.32 20.150.192.63