Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kristiansand

Region: Vest-Agder

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.164.150.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.164.150.107.			IN	A

;; AUTHORITY SECTION:
.			575	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070200 1800 900 604800 86400

;; Query time: 264 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 02 17:11:11 CST 2020
;; MSG SIZE  rcvd: 118
Host info
107.150.164.85.in-addr.arpa domain name pointer ti0013a400-3934.bb.online.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.150.164.85.in-addr.arpa	name = ti0013a400-3934.bb.online.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
170.130.187.34 attackbots
Port scan: Attack repeated for 24 hours
2019-11-19 17:55:37
104.140.188.30 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-19 17:59:51
117.4.36.59 attackspambots
[portscan] tcp/1433 [MsSQL]
*(RWIN=8192)(11190859)
2019-11-19 17:57:18
103.111.134.6 attack
[portscan] tcp/21 [FTP]
[scan/connect: 8 time(s)]
in blocklist.de:'listed [ftp]'
in sorbs:'listed [spam]'
*(RWIN=65535)(11190859)
2019-11-19 18:16:26
111.74.153.234 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-11-19 17:58:43
60.22.52.9 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=49353)(11190859)
2019-11-19 18:03:21
124.142.112.221 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=18519)(11190859)
2019-11-19 18:12:25
182.126.96.186 attack
[portscan] tcp/23 [TELNET]
*(RWIN=39576)(11190859)
2019-11-19 17:52:16
190.96.128.183 attack
[portscan] tcp/23 [TELNET]
*(RWIN=64592)(11190859)
2019-11-19 17:51:11
79.107.96.156 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=15957)(11190859)
2019-11-19 18:18:36
89.36.147.124 attack
[portscan] tcp/1433 [MsSQL]
*(RWIN=8192)(11190859)
2019-11-19 18:17:40
177.75.130.219 attack
[portscan] tcp/23 [TELNET]
*(RWIN=52709)(11190859)
2019-11-19 17:53:47
139.220.192.57 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-19 17:56:33
112.216.119.230 attackbots
[portscan] tcp/21 [FTP]
[scan/connect: 15 time(s)]
in blocklist.de:'listed [ftp]'
*(RWIN=65535)(11190859)
2019-11-19 17:58:15
116.111.99.105 attack
[portscan] tcp/23 [TELNET]
*(RWIN=35012)(11190859)
2019-11-19 18:28:43

Recently Reported IPs

109.91.241.211 132.96.189.221 91.245.140.180 108.210.2.247
130.146.14.8 45.56.225.212 202.10.49.131 193.77.100.3
173.36.207.39 36.132.104.213 170.99.161.115 88.8.220.46
191.212.114.34 133.146.1.150 12.146.125.69 71.53.240.74
50.210.4.114 205.143.187.222 136.70.154.131 93.126.152.126