Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kristiansand

Region: Vest-Agder

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.164.241.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57179
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.164.241.109.			IN	A

;; AUTHORITY SECTION:
.			552	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020300 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 16:38:08 CST 2020
;; MSG SIZE  rcvd: 118
Host info
109.241.164.85.in-addr.arpa domain name pointer ti0033a400-6481.bb.online.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.241.164.85.in-addr.arpa	name = ti0033a400-6481.bb.online.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.147.225.98 attackbots
20 attempts against mh-ssh on water
2020-06-21 18:38:42
144.217.158.247 attack
"fail2ban match"
2020-06-21 18:25:01
64.71.32.87 attackspambots
64.71.32.87 - - [21/Jun/2020:05:16:27 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
64.71.32.87 - - [21/Jun/2020:05:24:22 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
64.71.32.87 - - [21/Jun/2020:05:24:22 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
...
2020-06-21 18:32:06
171.88.157.225 attackspam
1592711441 - 06/21/2020 05:50:41 Host: 171.88.157.225/171.88.157.225 Port: 445 TCP Blocked
2020-06-21 18:36:58
46.38.145.4 attack
2020-06-21 10:12:08 auth_plain authenticator failed for (User) [46.38.145.4]: 535 Incorrect authentication data (set_id=domain@csmailer.org)
2020-06-21 10:12:51 auth_plain authenticator failed for (User) [46.38.145.4]: 535 Incorrect authentication data (set_id=mango@csmailer.org)
2020-06-21 10:13:34 auth_plain authenticator failed for (User) [46.38.145.4]: 535 Incorrect authentication data (set_id=edc@csmailer.org)
2020-06-21 10:14:17 auth_plain authenticator failed for (User) [46.38.145.4]: 535 Incorrect authentication data (set_id=prueba2@csmailer.org)
2020-06-21 10:15:01 auth_plain authenticator failed for (User) [46.38.145.4]: 535 Incorrect authentication data (set_id=ttc@csmailer.org)
...
2020-06-21 18:37:31
23.94.27.17 attack
(From claudiauclement@yahoo.com) Hi, We are wondering if you would be interested in our service, where we can provide you with a dofollow link from Amazon (DA 96) back to superchiros.com?

The price is just $67 per link, via Paypal.

To explain what DA is and the benefit for your website, along with a sample of an existing link, please read here: https://pastelink.net/1nm60

If you'd be interested in learning more, reply to this email but please make sure you include the word INTERESTED in the subject line field.

Kind Regards,
Claudia
2020-06-21 18:28:52
219.250.188.107 attack
Jun 21 12:20:51 lnxmysql61 sshd[7009]: Failed password for root from 219.250.188.107 port 36470 ssh2
Jun 21 12:20:51 lnxmysql61 sshd[7009]: Failed password for root from 219.250.188.107 port 36470 ssh2
2020-06-21 18:39:01
114.34.122.121 attackspambots
firewall-block, port(s): 8000/tcp
2020-06-21 19:02:22
164.132.44.218 attack
Jun 21 09:15:48 ws26vmsma01 sshd[122867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.44.218
Jun 21 09:15:49 ws26vmsma01 sshd[122867]: Failed password for invalid user avi from 164.132.44.218 port 53011 ssh2
...
2020-06-21 18:42:45
43.228.79.234 attack
Invalid user dasusr1 from 43.228.79.234 port 59924
2020-06-21 18:50:47
159.89.9.84 attackspambots
failed root login
2020-06-21 18:56:49
68.183.103.44 attackspambots
 TCP (SYN) 68.183.103.44:59045 -> port 8080, len 40
2020-06-21 18:49:33
114.86.219.114 attack
$f2bV_matches
2020-06-21 18:39:28
106.12.182.38 attackbots
Jun 21 08:30:31 marvibiene sshd[44003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.182.38  user=root
Jun 21 08:30:34 marvibiene sshd[44003]: Failed password for root from 106.12.182.38 port 43120 ssh2
Jun 21 08:36:53 marvibiene sshd[44087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.182.38  user=root
Jun 21 08:36:56 marvibiene sshd[44087]: Failed password for root from 106.12.182.38 port 39524 ssh2
...
2020-06-21 19:05:02
222.186.42.13 attackbots
SmallBizIT.US 1 packets to tcp(22)
2020-06-21 18:25:58

Recently Reported IPs

145.177.77.34 140.167.162.221 35.89.129.215 159.248.10.201
142.68.161.83 220.208.221.109 183.166.126.220 209.120.243.218
203.250.171.135 14.190.41.36 167.4.121.235 54.88.185.112
149.12.226.254 140.113.158.225 192.254.194.147 163.175.141.25
94.25.170.69 15.32.29.205 13.127.6.234 1.54.209.231