Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.26.194.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2769
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.26.194.249.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 07:32:08 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 249.194.26.85.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.194.26.85.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.95.168.148 attackbots
 TCP (SYN) 45.95.168.148:37649 -> port 1883, len 44
2020-10-01 07:23:59
103.219.112.31 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 90 - port: 229 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 07:08:45
188.4.85.59 attack
Invalid user testuser from 188.4.85.59 port 50070
2020-10-01 07:29:19
5.189.130.92 attackspambots
firewall-block, port(s): 5038/tcp
2020-10-01 07:25:14
45.129.33.14 attackbotsspam
scans 13 times in preceeding hours on the ports (in chronological order) 48340 48335 48347 48350 48343 48353 48347 48346 48348 48341 48349 48335 48338 resulting in total of 113 scans from 45.129.33.0/24 block.
2020-10-01 06:56:05
80.82.78.100 attackspambots
scans 6 times in preceeding hours on the ports (in chronological order) 1030 1045 1055 1060 1067 1088 resulting in total of 275 scans from 80.82.64.0/20 block.
2020-10-01 07:15:34
5.45.68.133 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 5 - port: 55611 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 07:26:06
45.143.221.97 attackspambots
 TCP (SYN) 45.143.221.97:47878 -> port 65060, len 44
2020-10-01 07:18:29
111.40.7.84 attack
 TCP (SYN) 111.40.7.84:57925 -> port 1433, len 44
2020-10-01 07:06:36
92.118.161.53 attackbotsspam
 TCP (SYN) 92.118.161.53:58574 -> port 8081, len 44
2020-10-01 07:10:55
193.27.228.172 attack
Port-scan: detected 211 distinct ports within a 24-hour window.
2020-10-01 07:02:00
45.129.33.15 attackspam
[MK-Root1] Blocked by UFW
2020-10-01 07:22:56
185.193.90.166 attack
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-01 07:02:50
5.188.156.92 attackspambots
firewall-block, port(s): 33389/tcp
2020-10-01 06:58:28
94.102.49.193 attackspam
Brute force attack stopped by firewall
2020-10-01 07:09:53

Recently Reported IPs

110.74.195.80 177.53.68.226 83.57.235.237 186.93.63.159
59.180.129.198 90.1.215.189 138.188.176.46 24.152.2.65
172.70.34.161 150.255.99.101 115.54.216.85 117.251.54.6
34.79.100.198 179.51.58.54 201.199.230.171 171.241.77.150
39.144.14.218 45.146.160.57 77.106.252.169 112.226.156.180