Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.229.127.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.229.127.152.			IN	A

;; AUTHORITY SECTION:
.			480	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011201 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 07:21:46 CST 2022
;; MSG SIZE  rcvd: 107
Host info
152.127.229.85.in-addr.arpa domain name pointer ua-85-229-127-152.bbcust.telenor.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
152.127.229.85.in-addr.arpa	name = ua-85-229-127-152.bbcust.telenor.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.241.245.248 attackbots
" "
2020-07-07 00:25:19
192.241.227.28 attack
IP 192.241.227.28 attacked honeypot on port: 88 at 7/6/2020 8:05:01 AM
2020-07-07 00:34:00
104.248.41.95 attack
scans once in preceeding hours on the ports (in chronological order) 6066 resulting in total of 6 scans from 104.248.0.0/16 block.
2020-07-07 00:15:31
223.71.167.164 attack
 TCP (SYN) 223.71.167.164:17076 -> port 28017, len 44
2020-07-07 00:51:04
192.241.225.108 attackspam
scans once in preceeding hours on the ports (in chronological order) 9200 resulting in total of 70 scans from 192.241.128.0/17 block.
2020-07-07 00:36:22
192.241.219.60 attackspambots
scans once in preceeding hours on the ports (in chronological order) 2000 resulting in total of 70 scans from 192.241.128.0/17 block.
2020-07-07 00:54:33
89.248.172.85 attack
SmallBizIT.US 6 packets to tcp(5552,5630,11101,11173,43330,43396)
2020-07-07 00:16:43
104.248.90.77 attackbots
 TCP (SYN) 104.248.90.77:57960 -> port 7684, len 44
2020-07-07 00:15:06
192.241.219.194 attack
Port scan: Attack repeated for 24 hours
2020-07-07 00:53:40
223.71.167.166 attack
firewall-block, port(s): 1604/tcp, 5632/udp, 6664/tcp, 8883/tcp, 50100/tcp
2020-07-07 00:50:23
192.241.220.106 attack
scans once in preceeding hours on the ports (in chronological order) 8005 resulting in total of 70 scans from 192.241.128.0/17 block.
2020-07-07 00:45:32
192.241.227.216 attackbots
scans once in preceeding hours on the ports (in chronological order) 1434 resulting in total of 70 scans from 192.241.128.0/17 block.
2020-07-07 00:31:15
94.102.49.82 attackspam
SmallBizIT.US 5 packets to tcp(41012,41069,41091,41106,41137)
2020-07-07 00:15:49
64.227.19.127 attackspam
" "
2020-07-07 00:23:18
89.248.167.131 attackbots
Port scan: Attack repeated for 24 hours
2020-07-07 00:19:33

Recently Reported IPs

87.81.171.125 190.123.179.160 29.110.133.131 151.94.249.243
106.189.150.76 200.13.3.38 28.253.255.212 42.244.14.24
96.229.224.84 136.8.56.63 186.135.203.178 172.141.68.96
248.54.167.143 160.122.45.7 226.116.115.214 52.175.116.187
58.103.19.161 250.24.35.55 94.47.137.66 96.254.24.209