Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.252.164.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18492
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.252.164.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 03:17:01 CST 2025
;; MSG SIZE  rcvd: 105
Host info
3.164.252.85.in-addr.arpa domain name pointer static3.banetele-cust.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.164.252.85.in-addr.arpa	name = static3.banetele-cust.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.245.145.56 attackbots
(From linette.cabrera69@msn.com) Hello, I was just taking a look at your site and filled out your "contact us" form. The "contact us" page on your site sends you these messages via email which is the reason you're reading my message at this moment right? That's the most important accomplishment with any type of online ad, making people actually READ your advertisement and I did that just now with you! If you have an ad message you would like to promote to lots of websites via their contact forms in the U.S. or to any country worldwide let me know, I can even focus on specific niches and my prices are very reasonable. Send a reply to: lethamidurr@gmail.com
2020-03-23 20:01:21
129.28.29.57 attack
2020-03-22 UTC: (9x) - abdullah,be,francesca,fujimura,neola,qi,resin,support,vbox
2020-03-23 19:37:33
116.108.199.11 attack
445/tcp
[2020-03-23]1pkt
2020-03-23 20:02:11
180.251.165.59 attackspambots
1584945297 - 03/23/2020 07:34:57 Host: 180.251.165.59/180.251.165.59 Port: 445 TCP Blocked
2020-03-23 19:47:38
1.34.242.32 attackspambots
23/tcp
[2020-03-23]1pkt
2020-03-23 20:12:57
181.143.186.235 attackbotsspam
Brute force attempt
2020-03-23 19:59:07
125.224.161.239 attackspam
20/3/23@03:37:55: FAIL: Alarm-Network address from=125.224.161.239
20/3/23@03:37:55: FAIL: Alarm-Network address from=125.224.161.239
...
2020-03-23 19:32:37
124.122.104.232 attackbotsspam
Attempted connection to port 9530.
2020-03-23 20:14:08
51.141.11.240 attackbotsspam
Brute force SMTP login attempted.
...
2020-03-23 20:16:43
1.34.137.214 attackbotsspam
Honeypot attack, port: 81, PTR: 1-34-137-214.HINET-IP.hinet.net.
2020-03-23 19:28:54
151.237.3.154 attack
26/tcp
[2020-03-23]1pkt
2020-03-23 19:46:24
103.206.136.48 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-23 19:41:02
115.54.155.100 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-23 19:43:48
83.13.209.154 attackbots
Mar 23 11:00:20 IngegnereFirenze sshd[2797]: Did not receive identification string from 83.13.209.154 port 53744
...
2020-03-23 19:41:56
185.139.68.152 attackbots
SSH/22 MH Probe, BF, Hack -
2020-03-23 19:38:30

Recently Reported IPs

175.118.160.98 13.236.96.189 168.87.71.63 217.68.229.115
233.179.87.99 135.2.94.3 220.63.88.187 66.15.251.79
236.219.205.169 198.239.235.66 222.11.146.174 241.39.96.215
177.71.102.114 39.151.10.6 69.162.104.8 28.105.96.175
215.147.63.112 135.71.109.11 84.9.157.201 37.183.66.82