Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: CJSC Media Alliance

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.85.252.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51365
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.85.252.34.			IN	A

;; AUTHORITY SECTION:
.			3078	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090401 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Sep 05 01:24:57 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 34.252.85.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 34.252.85.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.229.168.132 attackspam
Automatic report - Banned IP Access
2020-01-19 14:01:52
183.220.146.251 attackbotsspam
Jan 19 04:56:49 pi sshd[25210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.220.146.251  user=root
Jan 19 04:56:50 pi sshd[25210]: Failed password for invalid user root from 183.220.146.251 port 59917 ssh2
2020-01-19 14:04:40
213.195.64.88 attackspam
Unauthorized connection attempt detected from IP address 213.195.64.88 to port 1433 [J]
2020-01-19 14:28:49
62.234.206.12 attackspambots
Jan 19 05:57:08 pornomens sshd\[14677\]: Invalid user inaldo from 62.234.206.12 port 59718
Jan 19 05:57:08 pornomens sshd\[14677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.206.12
Jan 19 05:57:10 pornomens sshd\[14677\]: Failed password for invalid user inaldo from 62.234.206.12 port 59718 ssh2
...
2020-01-19 13:55:44
15.206.73.54 attack
Unauthorized connection attempt detected from IP address 15.206.73.54 to port 2220 [J]
2020-01-19 13:54:56
223.152.100.86 attackspambots
Unauthorized connection attempt detected from IP address 223.152.100.86 to port 5555 [J]
2020-01-19 14:24:57
218.17.122.50 attackspambots
Unauthorized connection attempt detected from IP address 218.17.122.50 to port 2220 [J]
2020-01-19 14:28:26
47.93.117.195 attack
Jan 19 05:56:49 pornomens sshd\[14645\]: Invalid user tesla from 47.93.117.195 port 51482
Jan 19 05:56:49 pornomens sshd\[14645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.93.117.195
Jan 19 05:56:51 pornomens sshd\[14645\]: Failed password for invalid user tesla from 47.93.117.195 port 51482 ssh2
...
2020-01-19 14:04:24
85.96.176.172 attackbotsspam
Unauthorized connection attempt detected from IP address 85.96.176.172 to port 23 [J]
2020-01-19 14:22:19
113.58.241.246 attackbotsspam
Unauthorized connection attempt detected from IP address 113.58.241.246 to port 80 [J]
2020-01-19 14:18:55
222.186.52.139 attackspambots
Unauthorized connection attempt detected from IP address 222.186.52.139 to port 22 [J]
2020-01-19 13:59:30
118.42.125.170 attackbotsspam
Unauthorized connection attempt detected from IP address 118.42.125.170 to port 2220 [J]
2020-01-19 14:17:28
201.93.47.132 attackbots
unauthorized connection attempt
2020-01-19 14:01:00
112.66.102.224 attack
Unauthorized connection attempt detected from IP address 112.66.102.224 to port 80 [J]
2020-01-19 14:46:57
83.179.214.143 attack
unauthorized connection attempt
2020-01-19 14:52:15

Recently Reported IPs

49.205.177.139 175.34.139.50 142.110.220.235 101.150.228.153
213.229.100.82 219.121.131.183 134.148.39.14 27.72.143.245
47.89.86.62 216.1.77.233 151.96.68.38 90.62.211.242
154.144.21.182 93.40.116.54 5.197.195.126 104.55.5.227
58.34.17.27 101.64.66.239 106.153.181.26 180.17.66.219