Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.0.164.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52082
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.0.164.129.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 13:59:33 CST 2025
;; MSG SIZE  rcvd: 105
Host info
129.164.0.85.in-addr.arpa domain name pointer 129.164.0.85.dynamic.cust.swisscom.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.164.0.85.in-addr.arpa	name = 129.164.0.85.dynamic.cust.swisscom.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.113 attackbots
$f2bV_matches
2019-11-28 00:19:19
196.52.43.61 attack
196.52.43.61 was recorded 6 times by 5 hosts attempting to connect to the following ports: 3388,62078,5902,5060,5916,8531. Incident counter (4h, 24h, all-time): 6, 22, 201
2019-11-28 00:17:22
13.89.48.117 attack
22 attack
2019-11-28 00:00:07
196.52.43.93 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-27 23:39:03
192.144.142.72 attackbots
Nov 27 20:24:01 areeb-Workstation sshd[9089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.142.72 
Nov 27 20:24:03 areeb-Workstation sshd[9089]: Failed password for invalid user eeeeee from 192.144.142.72 port 36165 ssh2
...
2019-11-28 00:11:13
196.52.43.91 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-27 23:45:05
58.210.6.54 attack
Nov 27 15:54:41 MK-Soft-VM6 sshd[26772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.6.54 
Nov 27 15:54:43 MK-Soft-VM6 sshd[26772]: Failed password for invalid user falbee from 58.210.6.54 port 35967 ssh2
...
2019-11-27 23:35:40
139.199.66.206 attackbots
Nov 27 15:54:55 vpn01 sshd[28034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.66.206
Nov 27 15:54:57 vpn01 sshd[28034]: Failed password for invalid user sheilamaui from 139.199.66.206 port 39306 ssh2
...
2019-11-27 23:27:33
5.101.156.172 attackspam
5.101.156.172 - - \[27/Nov/2019:15:54:12 +0100\] "POST /wp-login.php HTTP/1.0" 200 7538 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
5.101.156.172 - - \[27/Nov/2019:15:54:13 +0100\] "POST /wp-login.php HTTP/1.0" 200 7363 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
5.101.156.172 - - \[27/Nov/2019:15:54:15 +0100\] "POST /wp-login.php HTTP/1.0" 200 7358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-28 00:01:22
92.54.54.89 attackspam
UTC: 2019-11-26 port: 23/tcp
2019-11-28 00:15:53
106.12.78.161 attackbots
Nov 27 05:22:49 web9 sshd\[13904\]: Invalid user wilgus from 106.12.78.161
Nov 27 05:22:49 web9 sshd\[13904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.161
Nov 27 05:22:51 web9 sshd\[13904\]: Failed password for invalid user wilgus from 106.12.78.161 port 47120 ssh2
Nov 27 05:26:42 web9 sshd\[14480\]: Invalid user mihai from 106.12.78.161
Nov 27 05:26:42 web9 sshd\[14480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.161
2019-11-27 23:34:15
93.115.151.232 attackspam
Nov 27 11:46:08 firewall sshd[32526]: Failed password for invalid user jazz_office from 93.115.151.232 port 41358 ssh2
Nov 27 11:54:04 firewall sshd[32700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.115.151.232  user=root
Nov 27 11:54:07 firewall sshd[32700]: Failed password for root from 93.115.151.232 port 42156 ssh2
...
2019-11-28 00:09:21
177.21.9.207 attackbotsspam
UTC: 2019-11-26 port: 26/tcp
2019-11-27 23:28:09
220.176.204.91 attackbotsspam
Nov 27 10:46:39 ny01 sshd[9116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.176.204.91
Nov 27 10:46:41 ny01 sshd[9116]: Failed password for invalid user round from 220.176.204.91 port 9413 ssh2
Nov 27 10:51:24 ny01 sshd[9531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.176.204.91
2019-11-28 00:01:38
213.45.101.237 attack
Automatic report - Port Scan Attack
2019-11-27 23:57:26

Recently Reported IPs

66.220.201.7 182.224.191.35 122.173.168.95 122.237.150.98
169.164.126.254 96.191.73.169 135.48.46.102 94.26.246.207
90.70.166.22 220.202.111.216 101.125.198.85 175.173.168.4
38.42.18.232 204.216.78.4 124.14.62.178 231.221.23.117
22.211.110.247 205.117.103.204 234.51.211.16 74.39.250.147