Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sandvika

Region: Viken

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.196.113.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12730
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.196.113.64.			IN	A

;; AUTHORITY SECTION:
.			148	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042302 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 24 07:47:50 CST 2020
;; MSG SIZE  rcvd: 117
Host info
64.113.196.85.in-addr.arpa domain name pointer c85-196-113-64.static.xdsl.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
64.113.196.85.in-addr.arpa	name = c85-196-113-64.static.xdsl.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.52.52.23 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2019-10-16 23:23:41
185.173.35.33 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 23:43:45
143.215.172.79 attack
Port scan on 1 port(s): 53
2019-10-16 23:56:40
93.191.46.25 attackspambots
5 failed pop/imap login attempts in 3600s
2019-10-16 23:54:18
218.92.0.208 attackbotsspam
2019-10-16T15:39:06.141583abusebot-7.cloudsearch.cf sshd\[3850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208  user=root
2019-10-16 23:39:13
1.179.185.50 attackbotsspam
Oct 16 03:25:34 hpm sshd\[17348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50  user=root
Oct 16 03:25:36 hpm sshd\[17348\]: Failed password for root from 1.179.185.50 port 34320 ssh2
Oct 16 03:30:15 hpm sshd\[17768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50  user=root
Oct 16 03:30:17 hpm sshd\[17768\]: Failed password for root from 1.179.185.50 port 44370 ssh2
Oct 16 03:34:56 hpm sshd\[18172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50  user=root
2019-10-16 23:48:42
5.200.93.153 attackbotsspam
Automatic report - Port Scan Attack
2019-10-16 23:19:15
77.40.2.8 attackbots
10/16/2019-17:17:18.991303 77.40.2.8 Protocol: 6 SURICATA SMTP tls rejected
2019-10-16 23:35:34
37.113.170.62 attack
Automatic report - Banned IP Access
2019-10-16 23:45:49
106.12.30.229 attackspam
$f2bV_matches
2019-10-16 23:52:55
153.254.113.26 attackbots
Oct 16 16:21:28 lnxweb62 sshd[11668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.254.113.26
2019-10-16 23:29:15
39.53.72.49 attack
39.53.72.49 - - \[16/Oct/2019:04:19:37 -0700\] "POST /index.php/admin/index/ HTTP/1.1" 404 2062339.53.72.49 - - \[16/Oct/2019:04:19:37 -0700\] "POST /index.php/admin/sales_order/ HTTP/1.1" 404 2064739.53.72.49 - Admin \[16/Oct/2019:04:19:37 -0700\] "GET /rss/catalog/notifystock/ HTTP/1.1" 401 25
...
2019-10-16 23:47:28
45.80.65.80 attack
Oct 16 05:39:12 auw2 sshd\[21576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.80  user=root
Oct 16 05:39:15 auw2 sshd\[21576\]: Failed password for root from 45.80.65.80 port 54460 ssh2
Oct 16 05:44:52 auw2 sshd\[22081\]: Invalid user vo from 45.80.65.80
Oct 16 05:44:52 auw2 sshd\[22081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.80
Oct 16 05:44:54 auw2 sshd\[22081\]: Failed password for invalid user vo from 45.80.65.80 port 36698 ssh2
2019-10-17 00:00:47
110.188.70.99 attack
Oct 16 14:04:36 hcbbdb sshd\[7704\]: Invalid user 12345!@ from 110.188.70.99
Oct 16 14:04:36 hcbbdb sshd\[7704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.188.70.99
Oct 16 14:04:38 hcbbdb sshd\[7704\]: Failed password for invalid user 12345!@ from 110.188.70.99 port 37508 ssh2
Oct 16 14:10:46 hcbbdb sshd\[8304\]: Invalid user stupid from 110.188.70.99
Oct 16 14:10:46 hcbbdb sshd\[8304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.188.70.99
2019-10-16 23:38:42
220.249.112.150 attackspambots
$f2bV_matches_ltvn
2019-10-16 23:20:57

Recently Reported IPs

27.128.177.8 40.139.67.143 186.220.212.87 188.170.177.194
213.157.251.113 39.217.42.39 168.80.180.143 13.90.200.181
80.24.108.165 96.252.108.245 105.205.129.140 146.85.175.244
80.160.102.114 144.217.19.8 138.232.103.155 137.117.245.201
31.184.219.66 47.61.32.39 2.249.255.46 71.250.223.127