Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: BKK Digitek AS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.200.81.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11023
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.200.81.77.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051300 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon May 13 22:42:48 CST 2019
;; MSG SIZE  rcvd: 116

Host info
77.81.200.85.in-addr.arpa domain name pointer 77.85-200-81.bkkb.no.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
77.81.200.85.in-addr.arpa	name = 77.85-200-81.bkkb.no.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
129.211.131.152 attack
Invalid user user from 129.211.131.152 port 36207
2020-01-10 22:31:57
129.204.11.222 attackspam
Invalid user vo from 129.204.11.222 port 53886
2020-01-10 22:32:17
178.16.175.146 attack
Invalid user oracle from 178.16.175.146 port 46012
2020-01-10 22:11:22
104.178.162.203 attackspam
unauthorized connection attempt
2020-01-10 22:39:45
156.221.116.240 attackspambots
Invalid user admin from 156.221.116.240 port 33039
2020-01-10 22:29:16
198.98.48.109 attackspambots
Invalid user andy from 198.98.48.109 port 54252
2020-01-10 22:08:58
201.149.20.162 attackspam
Invalid user user from 201.149.20.162 port 32864
2020-01-10 22:24:13
103.79.90.70 attackbots
Invalid user student from 103.79.90.70 port 53484
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.79.90.70
Failed password for invalid user student from 103.79.90.70 port 53484 ssh2
Invalid user dcy from 103.79.90.70 port 50772
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.79.90.70
2020-01-10 22:16:53
111.231.141.221 attackbotsspam
Invalid user opn from 111.231.141.221 port 49506
2020-01-10 22:37:55
188.16.84.189 attackbots
Invalid user admin from 188.16.84.189 port 34129
2020-01-10 22:27:04
117.240.166.51 attackbots
Invalid user admin from 117.240.166.51 port 55528
2020-01-10 22:36:15
132.232.79.135 attack
Invalid user nexus from 132.232.79.135 port 59508
2020-01-10 22:31:38
1.249.135.14 attackbotsspam
Jan 10 13:59:05 grey postfix/smtpd\[26110\]: NOQUEUE: reject: RCPT from unknown\[1.249.135.14\]: 554 5.7.1 Service unavailable\; Client host \[1.249.135.14\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[1.249.135.14\]\; from=\ to=\ proto=ESMTP helo=\<\[1.249.135.14\]\>
...
2020-01-10 22:20:06
113.189.146.54 attackspambots
1578661032 - 01/10/2020 13:57:12 Host: 113.189.146.54/113.189.146.54 Port: 445 TCP Blocked
2020-01-10 22:06:50
119.161.156.11 attack
Invalid user gmp from 119.161.156.11 port 45278
2020-01-10 22:34:44

Recently Reported IPs

83.92.104.51 2.154.2.209 49.116.10.80 68.199.92.113
55.9.178.8 68.151.242.89 121.122.254.77 77.26.216.180
58.100.139.47 195.152.176.158 67.79.113.34 211.209.69.235
123.12.48.17 181.83.231.14 114.146.175.125 216.6.207.223
164.195.119.49 171.4.29.115 218.44.154.54 193.35.129.150