Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: Broadnet AS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.252.83.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43022
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.252.83.136.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 29 23:28:14 CST 2019
;; MSG SIZE  rcvd: 117

Host info
136.83.252.85.in-addr.arpa domain name pointer static136.banetele-cust.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
136.83.252.85.in-addr.arpa	name = static136.banetele-cust.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
189.4.151.102 attackbots
Invalid user ogazon from 189.4.151.102 port 59692
2020-05-28 17:52:35
120.70.101.103 attackbots
SSH auth scanning - multiple failed logins
2020-05-28 18:20:18
181.65.252.9 attackspambots
May 28 12:00:10 server sshd[3575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.65.252.9
May 28 12:00:12 server sshd[3575]: Failed password for invalid user psiege from 181.65.252.9 port 45356 ssh2
May 28 12:04:36 server sshd[4514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.65.252.9
...
2020-05-28 18:21:37
151.80.60.151 attack
$f2bV_matches
2020-05-28 18:05:00
138.68.57.194 attack
2020-05-28T00:37:16.710772hessvillage.com sshd\[15279\]: Invalid user 987456321 from 138.68.57.194
2020-05-28T00:39:41.488181hessvillage.com sshd\[15283\]: Invalid user 987456321 from 138.68.57.194
2020-05-28T00:42:09.221948hessvillage.com sshd\[15294\]: Invalid user 987456321 from 138.68.57.194
2020-05-28T00:44:29.266230hessvillage.com sshd\[15297\]: Invalid user sammy from 138.68.57.194
2020-05-28T00:47:08.525522hessvillage.com sshd\[15307\]: Invalid user sammy from 138.68.57.194
...
2020-05-28 18:01:09
60.164.251.217 attack
Automatic report - Banned IP Access
2020-05-28 18:05:28
188.68.255.207 attack
SpamScore above: 10.0
2020-05-28 18:16:48
106.12.12.242 attack
Invalid user stef from 106.12.12.242 port 34176
2020-05-28 17:59:31
159.65.137.122 attack
Failed password for invalid user mysql from 159.65.137.122 port 34464 ssh2
2020-05-28 17:46:39
64.59.136.142 attackbotsspam
SSH login attempts.
2020-05-28 18:00:46
87.246.7.66 attackspam
May 28 11:42:44 statusweb1.srvfarm.net postfix/smtpd[19246]: warning: unknown[87.246.7.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 28 11:43:31 statusweb1.srvfarm.net postfix/smtpd[19246]: warning: unknown[87.246.7.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 28 11:44:18 statusweb1.srvfarm.net postfix/smtpd[19246]: warning: unknown[87.246.7.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 28 11:45:06 statusweb1.srvfarm.net postfix/smtpd[19246]: warning: unknown[87.246.7.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 28 11:45:52 statusweb1.srvfarm.net postfix/smtpd[19246]: warning: unknown[87.246.7.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-28 17:53:01
79.137.72.171 attackspam
Invalid user factory from 79.137.72.171 port 59042
2020-05-28 18:19:52
112.85.42.229 attack
May 28 11:32:30 abendstille sshd\[5517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229  user=root
May 28 11:32:33 abendstille sshd\[5517\]: Failed password for root from 112.85.42.229 port 45148 ssh2
May 28 11:33:22 abendstille sshd\[6287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229  user=root
May 28 11:33:24 abendstille sshd\[6287\]: Failed password for root from 112.85.42.229 port 59922 ssh2
May 28 11:33:27 abendstille sshd\[6287\]: Failed password for root from 112.85.42.229 port 59922 ssh2
...
2020-05-28 17:48:18
173.201.192.158 attack
SSH login attempts.
2020-05-28 18:22:25
195.9.110.66 attack
Port probing on unauthorized port 445
2020-05-28 18:13:09

Recently Reported IPs

151.143.195.6 116.125.138.249 198.242.18.241 89.113.229.74
107.81.130.44 201.39.71.147 155.135.43.229 14.131.120.157
133.40.76.172 119.175.136.242 220.55.243.228 212.116.237.95
207.159.144.154 133.8.105.45 179.134.173.196 47.220.207.70
109.65.223.7 117.180.162.27 110.33.66.227 34.239.255.158