Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Reykjavík

Region: Capital Region

Country: Iceland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.197.226.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.197.226.2.			IN	A

;; AUTHORITY SECTION:
.			577	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010300 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 04 03:05:36 CST 2020
;; MSG SIZE  rcvd: 116
Host info
2.226.197.85.in-addr.arpa domain name pointer dsl-226-2.hive.is.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.226.197.85.in-addr.arpa	name = dsl-226-2.hive.is.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.139.182.10 attackspambots
Unauthorized connection attempt from IP address 94.139.182.10 on Port 445(SMB)
2020-06-03 03:22:37
218.92.0.172 attack
[ssh] SSH attack
2020-06-03 03:12:26
90.143.153.8 attack
IP 90.143.153.8 attacked honeypot on port: 5000 at 6/2/2020 1:00:36 PM
2020-06-03 03:36:00
121.225.17.202 attack
(ftpd) Failed FTP login from 121.225.17.202 (CN/China/202.17.225.121.broad.nj.js.dynamic.163data.com.cn): 10 in the last 3600 secs
2020-06-03 03:19:21
82.62.67.4 attackspambots
Port probing on unauthorized port 8080
2020-06-03 03:27:46
80.254.104.24 attackspambots
Unauthorized connection attempt from IP address 80.254.104.24 on Port 445(SMB)
2020-06-03 03:33:08
37.187.195.209 attackspam
Jun  3 04:19:01 localhost sshd[3397559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.195.209  user=root
Jun  3 04:19:02 localhost sshd[3397559]: Failed password for root from 37.187.195.209 port 53997 ssh2
...
2020-06-03 03:25:59
194.26.29.53 attackspam
Jun  2 21:22:26 debian-2gb-nbg1-2 kernel: \[13384512.412953\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.53 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=4369 PROTO=TCP SPT=59268 DPT=5903 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-03 03:34:36
88.202.190.142 attackspambots
 TCP (SYN) 88.202.190.142:7443 -> port 7443, len 44
2020-06-03 03:12:09
52.231.10.53 attackbots
RDP Bruteforce
2020-06-03 03:31:17
157.38.243.173 attackspam
Unauthorized connection attempt from IP address 157.38.243.173 on Port 445(SMB)
2020-06-03 03:31:33
184.105.247.220 attack
 TCP (SYN) 184.105.247.220:38818 -> port 7547, len 44
2020-06-03 03:44:37
115.84.92.250 attack
failed_logins
2020-06-03 03:43:54
128.199.91.26 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-06-03 03:18:28
67.205.158.241 attack
2020-06-02T20:25:03.125669vps751288.ovh.net sshd\[19501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.158.241  user=root
2020-06-02T20:25:05.272426vps751288.ovh.net sshd\[19501\]: Failed password for root from 67.205.158.241 port 55054 ssh2
2020-06-02T20:28:26.178993vps751288.ovh.net sshd\[19542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.158.241  user=root
2020-06-02T20:28:28.195099vps751288.ovh.net sshd\[19542\]: Failed password for root from 67.205.158.241 port 59450 ssh2
2020-06-02T20:31:56.639656vps751288.ovh.net sshd\[19572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.158.241  user=root
2020-06-03 03:09:34

Recently Reported IPs

141.227.42.22 179.121.158.24 49.149.111.65 67.34.140.29
187.236.134.75 18.238.78.118 49.86.26.116 98.106.128.130
142.4.90.249 111.149.195.132 14.192.245.51 83.31.53.153
190.155.6.241 69.236.178.4 24.236.140.214 93.23.2.150
62.64.224.91 130.170.62.106 88.173.157.219 94.185.214.56