Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.196.126.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.196.126.117.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 18:53:17 CST 2025
;; MSG SIZE  rcvd: 107
Host info
117.126.196.85.in-addr.arpa domain name pointer c85-196-126-117.xdsl.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.126.196.85.in-addr.arpa	name = c85-196-126-117.xdsl.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
8.2.215.75 attackbotsspam
Honeypot attack, port: 23, PTR: 8-2-215-75.dsl-local.livingston.net.
2019-12-28 21:54:34
66.147.237.34 attackspam
firewall-block, port(s): 1433/tcp
2019-12-28 21:34:23
115.146.126.209 attack
Dec 28 14:55:17 XXX sshd[19771]: Invalid user sandahl from 115.146.126.209 port 40772
2019-12-28 22:03:36
144.217.47.174 attackspam
Invalid user nicolau from 144.217.47.174 port 53175
2019-12-28 21:57:40
77.81.230.143 attackbots
2019-12-28T13:33:04.519775shield sshd\[18682\]: Invalid user ghirardi from 77.81.230.143 port 60316
2019-12-28T13:33:04.526270shield sshd\[18682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.230.143
2019-12-28T13:33:06.500815shield sshd\[18682\]: Failed password for invalid user ghirardi from 77.81.230.143 port 60316 ssh2
2019-12-28T13:41:28.457429shield sshd\[20461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.230.143  user=root
2019-12-28T13:41:29.955203shield sshd\[20461\]: Failed password for root from 77.81.230.143 port 58668 ssh2
2019-12-28 21:45:41
185.164.72.217 attack
proto=tcp  .  spt=42146  .  dpt=3389  .  src=185.164.72.217  .  dst=xx.xx.4.1  .     (Listed on    rbldns-ru also zen-spamhaus and abuseat-org)     (553)
2019-12-28 21:30:34
87.26.157.79 attackbotsspam
1577514037 - 12/28/2019 07:20:37 Host: 87.26.157.79/87.26.157.79 Port: 445 TCP Blocked
2019-12-28 21:22:26
189.197.170.254 attack
Honeypot attack, port: 445, PTR: customer-COB-MCA-170-254.megared.net.mx.
2019-12-28 21:55:20
37.120.152.214 attack
Honeypot attack, port: 389, PTR: PTR record not found
2019-12-28 21:58:10
162.62.17.226 attackspambots
firewall-block, port(s): 8999/tcp
2019-12-28 21:43:51
50.201.228.238 attack
Unauthorized connection attempt detected from IP address 50.201.228.238 to port 445
2019-12-28 21:45:20
106.12.13.247 attackbots
Dec 28 09:07:23 serwer sshd\[11979\]: Invalid user zut from 106.12.13.247 port 41850
Dec 28 09:07:23 serwer sshd\[11979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.247
Dec 28 09:07:25 serwer sshd\[11979\]: Failed password for invalid user zut from 106.12.13.247 port 41850 ssh2
...
2019-12-28 21:51:59
123.115.149.25 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-12-28 21:25:30
103.45.102.124 attack
Brute force attempt
2019-12-28 21:34:42
183.146.64.159 attackspambots
Scanning
2019-12-28 21:46:49

Recently Reported IPs

247.178.119.252 125.253.104.138 18.107.58.208 187.51.51.15
202.207.196.76 64.165.212.129 214.220.26.104 145.58.49.55
162.198.3.213 87.167.80.111 97.65.108.133 186.218.217.219
45.137.134.105 81.249.76.243 98.158.81.163 200.0.55.242
214.166.141.191 54.163.140.166 56.220.211.144 197.14.41.103