Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
82.208.85.34 attackspambots
Unauthorized connection attempt detected from IP address 82.208.85.34 to port 80 [J]
2020-01-31 02:18:34
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.208.85.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.208.85.139.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 03:47:39 CST 2025
;; MSG SIZE  rcvd: 106
Host info
139.85.208.82.in-addr.arpa domain name pointer 82-208-85-139.static.mts-nn.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.85.208.82.in-addr.arpa	name = 82-208-85-139.static.mts-nn.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
116.113.162.12 attackspam
23/tcp
[2020-05-08]1pkt
2020-05-09 04:45:14
61.178.249.23 attack
Unauthorized connection attempt detected from IP address 61.178.249.23 to port 1433 [T]
2020-05-09 04:15:38
109.116.119.16 attackspambots
Unauthorized connection attempt detected from IP address 109.116.119.16 to port 80 [T]
2020-05-09 04:49:08
58.47.77.59 attackspam
Unauthorized connection attempt detected from IP address 58.47.77.59 to port 80 [T]
2020-05-09 04:19:06
49.51.155.205 attackbotsspam
Unauthorized connection attempt detected from IP address 49.51.155.205 to port 8800 [T]
2020-05-09 04:20:30
109.120.47.149 attackbots
Unauthorized connection attempt detected from IP address 109.120.47.149 to port 445 [T]
2020-05-09 04:48:38
37.59.224.39 attackbotsspam
May  8 22:44:26 PorscheCustomer sshd[5530]: Failed password for root from 37.59.224.39 port 58624 ssh2
May  8 22:47:51 PorscheCustomer sshd[5679]: Failed password for root from 37.59.224.39 port 34602 ssh2
...
2020-05-09 04:54:01
122.51.233.63 attack
Unauthorized connection attempt detected from IP address 122.51.233.63 to port 7598 [T]
2020-05-09 04:42:42
218.93.150.222 attackbots
Unauthorized connection attempt detected from IP address 218.93.150.222 to port 1433 [T]
2020-05-09 04:30:41
180.176.90.36 attackbotsspam
Unauthorized connection attempt detected from IP address 180.176.90.36 to port 445 [T]
2020-05-09 04:36:30
27.96.234.129 attackspambots
Port probing on unauthorized port 5555
2020-05-09 04:26:33
110.184.224.91 attack
Unauthorized connection attempt detected from IP address 110.184.224.91 to port 1433 [T]
2020-05-09 04:47:21
101.31.38.220 attack
Unauthorized connection attempt detected from IP address 101.31.38.220 to port 23 [T]
2020-05-09 04:50:33
77.247.108.119 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 62 - port: 5038 proto: TCP cat: Misc Attack
2020-05-09 04:52:40
59.59.38.226 attack
Unauthorized connection attempt detected from IP address 59.59.38.226 to port 80 [T]
2020-05-09 04:18:34

Recently Reported IPs

101.161.5.13 211.166.211.221 159.48.57.90 66.210.99.195
187.187.105.217 93.241.120.78 232.98.168.138 162.247.161.158
128.135.226.248 108.171.167.166 22.152.66.185 95.28.181.63
180.202.212.70 185.220.188.196 188.134.240.204 211.31.191.72
162.159.119.128 217.101.195.150 181.91.51.237 98.163.221.156