Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: Telenor Norge AS

Hostname: unknown

Organization: unknown

Usage Type: Mobile ISP

Comments:
Type Details Datetime
attackbotsspam
Lines containing failures of 85.164.29.199
/var/log/apache/pucorp.org.log.1:Feb  9 10:02:37 server01 postfix/smtpd[17253]: connect from ti0197a430-0707.bb.online.no[85.164.29.199]
/var/log/apache/pucorp.org.log.1:Feb x@x
/var/log/apache/pucorp.org.log.1:Feb x@x
/var/log/apache/pucorp.org.log.1:Feb  9 10:02:37 server01 postfix/policy-spf[17263]: : Policy action=PREPEND Received-SPF: none (att.net: No applicable sender policy available) receiver=x@x
/var/log/apache/pucorp.org.log.1:Feb x@x
/var/log/apache/pucorp.org.log.1:Feb  9 10:02:40 server01 postfix/smtpd[17253]: lost connection after DATA from ti0197a430-0707.bb.online.no[85.164.29.199]
/var/log/apache/pucorp.org.log.1:Feb  9 10:02:40 server01 postfix/smtpd[17253]: disconnect from ti0197a430-0707.bb.online.no[85.164.29.199]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=85.164.29.199
2020-02-17 02:09:24
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.164.29.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20532
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.164.29.199.			IN	A

;; AUTHORITY SECTION:
.			477	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021600 1800 900 604800 86400

;; Query time: 244 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 17 02:09:18 CST 2020
;; MSG SIZE  rcvd: 117
Host info
199.29.164.85.in-addr.arpa domain name pointer ti0197a430-0707.bb.online.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.29.164.85.in-addr.arpa	name = ti0197a430-0707.bb.online.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.83.57.157 attackspambots
Tried sshing with brute force.
2020-05-29 04:08:44
45.121.144.114 attackbotsspam
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-05-29 04:12:02
88.129.200.206 attackspambots
Invalid user pi from 88.129.200.206 port 50012
2020-05-29 04:07:26
175.124.43.162 attackbots
May 28 18:52:46 server sshd[56335]: Failed password for invalid user 1234 from 175.124.43.162 port 43056 ssh2
May 28 18:56:52 server sshd[59580]: Failed password for root from 175.124.43.162 port 49312 ssh2
May 28 19:01:07 server sshd[63251]: Failed password for invalid user recycle from 175.124.43.162 port 55544 ssh2
2020-05-29 03:51:19
206.189.128.215 attack
Invalid user severson from 206.189.128.215 port 39122
2020-05-29 03:42:17
162.243.253.67 attackspambots
May 28 21:37:47 buvik sshd[2640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.253.67  user=root
May 28 21:37:49 buvik sshd[2640]: Failed password for root from 162.243.253.67 port 55787 ssh2
May 28 21:43:03 buvik sshd[3444]: Invalid user jfortunato from 162.243.253.67
...
2020-05-29 03:53:34
213.137.179.203 attackspambots
(sshd) Failed SSH login from 213.137.179.203 (gw2.mail.transcom.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 28 15:28:00 amsweb01 sshd[29307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.137.179.203  user=root
May 28 15:28:02 amsweb01 sshd[29307]: Failed password for root from 213.137.179.203 port 45868 ssh2
May 28 15:36:35 amsweb01 sshd[30271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.137.179.203  user=root
May 28 15:36:38 amsweb01 sshd[30271]: Failed password for root from 213.137.179.203 port 30266 ssh2
May 28 15:40:03 amsweb01 sshd[30509]: Invalid user os from 213.137.179.203 port 4906
2020-05-29 03:40:25
112.217.225.61 attackbotsspam
Invalid user wang from 112.217.225.61 port 56303
2020-05-29 04:01:32
88.98.232.53 attack
21 attempts against mh-ssh on cloud
2020-05-29 04:07:42
14.116.187.31 attackbots
May 28 21:29:51 [host] sshd[10055]: pam_unix(sshd:
May 28 21:29:53 [host] sshd[10055]: Failed passwor
May 28 21:33:10 [host] sshd[10166]: Invalid user c
2020-05-29 03:38:34
178.199.252.194 attackspambots
Invalid user pi from 178.199.252.194 port 53472
2020-05-29 03:49:23
81.4.241.185 attackspambots
Invalid user administrator from 81.4.241.185 port 49581
2020-05-29 04:08:03
106.54.253.41 attack
May 28 17:59:41 [host] sshd[3672]: pam_unix(sshd:a
May 28 17:59:43 [host] sshd[3672]: Failed password
May 28 18:03:16 [host] sshd[3698]: Invalid user id
2020-05-29 04:02:01
89.223.26.220 attackbotsspam
Invalid user mkangethe from 89.223.26.220 port 50904
2020-05-29 04:06:29
206.189.154.99 attackbotsspam
Invalid user applmgr from 206.189.154.99 port 34878
2020-05-29 03:41:46

Recently Reported IPs

116.9.99.103 10.192.15.69 31.9.8.216 2.23.250.111
0.232.8.120 51.178.151.50 138.9.213.11 187.32.242.217
172.230.29.64 185.103.255.37 111.251.45.102 192.241.233.164
185.103.255.190 50.62.177.231 182.113.186.229 222.52.99.155
183.235.185.207 185.103.254.82 72.130.219.49 185.103.248.158