Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.112.148.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22487
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.112.148.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 07:25:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 136.148.112.85.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 136.148.112.85.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
89.163.223.246 attackspambots
2020-09-29T06:56:35.927617linuxbox-skyline sshd[216355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.163.223.246  user=root
2020-09-29T06:56:38.122018linuxbox-skyline sshd[216355]: Failed password for root from 89.163.223.246 port 33154 ssh2
...
2020-09-29 21:08:31
122.51.41.109 attack
Invalid user big from 122.51.41.109 port 35824
2020-09-29 21:43:40
122.51.101.136 attackspambots
 TCP (SYN) 122.51.101.136:46378 -> port 30199, len 44
2020-09-29 21:43:13
165.22.113.66 attackspam
$f2bV_matches
2020-09-29 21:29:42
212.133.233.23 attack
Sep 28 22:40:01 mellenthin postfix/smtpd[9741]: NOQUEUE: reject: RCPT from unknown[212.133.233.23]: 554 5.7.1 Service unavailable; Client host [212.133.233.23] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/212.133.233.23 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[212.133.233.23]>
2020-09-29 21:09:52
144.48.191.180 attackbots
SQL Injection
2020-09-29 21:28:08
185.136.52.158 attackbotsspam
Sep 29 06:24:45 rocket sshd[27824]: Failed password for root from 185.136.52.158 port 53426 ssh2
Sep 29 06:31:00 rocket sshd[28881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.136.52.158
...
2020-09-29 21:12:40
180.218.224.84 attackbots
Brute force SMTP login attempted.
...
2020-09-29 21:23:29
217.23.8.58 attackspambots
Sep 29 14:04:04 server sshd[12682]: Failed password for invalid user web from 217.23.8.58 port 57768 ssh2
Sep 29 14:07:36 server sshd[13456]: Failed password for invalid user jiayuanyang from 217.23.8.58 port 38306 ssh2
Sep 29 14:11:09 server sshd[14352]: Failed password for root from 217.23.8.58 port 46580 ssh2
2020-09-29 21:18:48
123.31.26.144 attack
Invalid user gera from 123.31.26.144 port 20448
2020-09-29 21:30:00
186.16.14.107 attackbotsspam
Automatic report - Banned IP Access
2020-09-29 21:36:53
199.127.61.38 attackspambots
Invalid user doris from 199.127.61.38 port 39830
2020-09-29 21:24:51
118.24.117.104 attack
Sep 29 13:35:24 vps647732 sshd[5384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.117.104
Sep 29 13:35:26 vps647732 sshd[5384]: Failed password for invalid user jonah from 118.24.117.104 port 46244 ssh2
...
2020-09-29 21:13:32
31.215.200.164 attackspambots
firewall-block, port(s): 445/tcp
2020-09-29 21:14:29
119.123.177.156 attackspambots
Sep 29 12:34:22 pornomens sshd\[19017\]: Invalid user hadoop from 119.123.177.156 port 37392
Sep 29 12:34:22 pornomens sshd\[19017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.123.177.156
Sep 29 12:34:25 pornomens sshd\[19017\]: Failed password for invalid user hadoop from 119.123.177.156 port 37392 ssh2
...
2020-09-29 21:35:27

Recently Reported IPs

36.182.217.31 54.231.238.52 223.104.87.211 174.223.69.208
132.122.184.91 70.148.250.140 2001:8a0:5789:7f01:4082:5b96:fc9e:53f9 9.128.52.79
34.43.137.5 250.162.188.31 83.250.220.13 137.237.29.198
164.111.93.29 250.80.153.128 172.172.240.231 82.129.123.81
125.215.106.99 155.20.136.201 151.252.126.209 193.41.202.39