Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Iceland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.197.234.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.197.234.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 05:06:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
99.234.197.85.in-addr.arpa domain name pointer dsl-234-99.hive.is.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.234.197.85.in-addr.arpa	name = dsl-234-99.hive.is.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.68.17.96 attackbotsspam
Aug 31 13:11:07 hiderm sshd\[32656\]: Invalid user evelina from 138.68.17.96
Aug 31 13:11:07 hiderm sshd\[32656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.17.96
Aug 31 13:11:09 hiderm sshd\[32656\]: Failed password for invalid user evelina from 138.68.17.96 port 38190 ssh2
Aug 31 13:15:16 hiderm sshd\[607\]: Invalid user stephen from 138.68.17.96
Aug 31 13:15:16 hiderm sshd\[607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.17.96
2019-09-01 07:31:00
119.10.114.5 attackspambots
2019-08-31T22:53:26.820610abusebot.cloudsearch.cf sshd\[21227\]: Invalid user inputws from 119.10.114.5 port 64047
2019-09-01 08:07:32
93.95.56.130 attackbots
Aug 31 11:44:59 php1 sshd\[32241\]: Invalid user kreo from 93.95.56.130
Aug 31 11:44:59 php1 sshd\[32241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.95.56.130
Aug 31 11:45:01 php1 sshd\[32241\]: Failed password for invalid user kreo from 93.95.56.130 port 59134 ssh2
Aug 31 11:50:50 php1 sshd\[304\]: Invalid user el from 93.95.56.130
Aug 31 11:50:50 php1 sshd\[304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.95.56.130
2019-09-01 07:59:32
118.24.143.233 attackbotsspam
Aug 31 11:48:43 web1 sshd\[21279\]: Invalid user henseler from 118.24.143.233
Aug 31 11:48:43 web1 sshd\[21279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.143.233
Aug 31 11:48:45 web1 sshd\[21279\]: Failed password for invalid user henseler from 118.24.143.233 port 55983 ssh2
Aug 31 11:51:27 web1 sshd\[21498\]: Invalid user j8LrZjtyudgwUkz from 118.24.143.233
Aug 31 11:51:27 web1 sshd\[21498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.143.233
2019-09-01 07:56:15
46.101.224.184 attackspam
Aug 31 18:11:02 aat-srv002 sshd[29374]: Failed password for root from 46.101.224.184 port 41248 ssh2
Aug 31 18:16:18 aat-srv002 sshd[29497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.224.184
Aug 31 18:16:21 aat-srv002 sshd[29497]: Failed password for invalid user claudia from 46.101.224.184 port 57838 ssh2
Aug 31 18:20:06 aat-srv002 sshd[29599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.224.184
...
2019-09-01 07:41:33
103.10.231.27 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-31 20:22:37,231 INFO [amun_request_handler] PortScan Detected on Port: 445 (103.10.231.27)
2019-09-01 07:56:48
114.67.74.139 attackbotsspam
Aug 31 13:29:41 lcdev sshd\[3625\]: Invalid user cisco from 114.67.74.139
Aug 31 13:29:41 lcdev sshd\[3625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.74.139
Aug 31 13:29:43 lcdev sshd\[3625\]: Failed password for invalid user cisco from 114.67.74.139 port 56036 ssh2
Aug 31 13:34:11 lcdev sshd\[3974\]: Invalid user neil from 114.67.74.139
Aug 31 13:34:11 lcdev sshd\[3974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.74.139
2019-09-01 07:49:49
119.92.241.82 attack
Seq 2995002506
2019-09-01 07:44:05
101.109.253.6 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-31 20:28:54,953 INFO [amun_request_handler] PortScan Detected on Port: 445 (101.109.253.6)
2019-09-01 07:34:36
106.12.28.36 attackbotsspam
Sep  1 01:33:11 root sshd[12618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.36 
Sep  1 01:33:12 root sshd[12618]: Failed password for invalid user jenkins from 106.12.28.36 port 55228 ssh2
Sep  1 01:36:32 root sshd[12713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.36 
...
2019-09-01 07:48:35
110.138.149.136 attack
Aug 31 23:43:02 extapp sshd[20731]: Invalid user supervisor from 110.138.149.136
Aug 31 23:43:03 extapp sshd[20733]: Invalid user supervisor from 110.138.149.136
Aug 31 23:43:05 extapp sshd[20731]: Failed password for invalid user supervisor from 110.138.149.136 port 47337 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=110.138.149.136
2019-09-01 07:26:19
138.59.219.47 attackbotsspam
Aug 31 13:15:36 auw2 sshd\[5881\]: Invalid user bot from 138.59.219.47
Aug 31 13:15:36 auw2 sshd\[5881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dynamic-138-59-219-47.ubaconecttelecom.net.br
Aug 31 13:15:38 auw2 sshd\[5881\]: Failed password for invalid user bot from 138.59.219.47 port 39977 ssh2
Aug 31 13:21:31 auw2 sshd\[6407\]: Invalid user oracle from 138.59.219.47
Aug 31 13:21:31 auw2 sshd\[6407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dynamic-138-59-219-47.ubaconecttelecom.net.br
2019-09-01 07:43:06
163.172.157.162 attack
Sep  1 01:34:44 srv206 sshd[5109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.157.162  user=root
Sep  1 01:34:47 srv206 sshd[5109]: Failed password for root from 163.172.157.162 port 44824 ssh2
...
2019-09-01 07:54:35
43.227.68.71 attack
Aug 31 17:38:02 askasleikir sshd[14631]: Failed password for root from 43.227.68.71 port 48104 ssh2
2019-09-01 07:26:38
157.230.34.123 attackspambots
Aug 31 13:20:57 php1 sshd\[8488\]: Invalid user system from 157.230.34.123
Aug 31 13:20:57 php1 sshd\[8488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.34.123
Aug 31 13:20:58 php1 sshd\[8488\]: Failed password for invalid user system from 157.230.34.123 port 50534 ssh2
Aug 31 13:25:48 php1 sshd\[8867\]: Invalid user user from 157.230.34.123
Aug 31 13:25:48 php1 sshd\[8867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.34.123
2019-09-01 07:41:54

Recently Reported IPs

185.76.11.241 121.156.37.231 245.241.211.227 187.138.90.103
7.189.64.191 210.232.166.171 63.225.142.213 170.118.159.106
13.72.195.38 221.146.150.232 83.97.89.187 209.114.38.130
161.245.191.41 93.4.115.211 81.129.141.176 84.178.193.254
6.72.242.130 27.140.29.197 203.41.207.97 36.35.15.99