Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: Telenor

Hostname: unknown

Organization: Telenor A/S

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.80.131.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58499
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.80.131.139.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 27 00:19:10 CST 2019
;; MSG SIZE  rcvd: 117
Host info
139.131.80.85.in-addr.arpa domain name pointer 0x5550838b.adsl.cybercity.dk.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
139.131.80.85.in-addr.arpa	name = 0x5550838b.adsl.cybercity.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
47.106.244.242 attack
Jun  9 15:01:02 lukav-desktop sshd\[8257\]: Invalid user admin from 47.106.244.242
Jun  9 15:01:02 lukav-desktop sshd\[8257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.106.244.242
Jun  9 15:01:05 lukav-desktop sshd\[8257\]: Failed password for invalid user admin from 47.106.244.242 port 43410 ssh2
Jun  9 15:02:00 lukav-desktop sshd\[8276\]: Invalid user odol from 47.106.244.242
Jun  9 15:02:00 lukav-desktop sshd\[8276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.106.244.242
2020-06-10 03:19:21
42.115.4.148 attack
Unauthorized connection attempt from IP address 42.115.4.148 on Port 445(SMB)
2020-06-10 02:43:15
175.29.188.190 attackspam
Unauthorized connection attempt from IP address 175.29.188.190 on Port 445(SMB)
2020-06-10 03:01:13
213.133.99.103 attackbotsspam
[H1] Blocked by UFW
2020-06-10 02:47:54
59.6.222.103 attack
Port probing on unauthorized port 8080
2020-06-10 03:01:49
123.59.213.68 attack
Tried sshing with brute force.
2020-06-10 03:02:32
176.60.199.37 attackspam
SMB Server BruteForce Attack
2020-06-10 03:05:27
36.89.134.29 attack
Unauthorized connection attempt from IP address 36.89.134.29 on Port 445(SMB)
2020-06-10 02:46:22
196.52.43.125 attackbotsspam
Jun  9 19:44:44 debian-2gb-nbg1-2 kernel: \[13983418.155921\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=196.52.43.125 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=244 ID=59163 PROTO=TCP SPT=63564 DPT=8531 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-10 02:45:00
110.35.80.82 attackbots
"fail2ban match"
2020-06-10 03:06:38
14.161.45.179 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-06-10 02:40:23
134.249.127.121 attackbots
tried to spam in our blog comments: [url=url_detected:mewkid dot net/when-is-xicix/]Amoxicillin[/url] Amoxicillin 500mg Dosage otl.jbku.thehun.net.cpp.ze url_detected:mewkid dot net/when-is-xicix/
2020-06-10 03:15:46
190.128.156.129 attackbotsspam
Unauthorized connection attempt detected from IP address 190.128.156.129 to port 445
2020-06-10 03:16:59
197.37.214.236 attack
Unauthorized connection attempt from IP address 197.37.214.236 on Port 445(SMB)
2020-06-10 03:09:38
149.140.162.36 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-10 03:10:32

Recently Reported IPs

128.104.194.203 17.141.75.33 141.70.0.207 134.253.217.126
31.78.111.7 173.64.58.59 173.183.157.210 80.157.102.124
102.181.204.80 101.196.47.29 144.64.80.69 106.223.113.175
176.251.19.4 37.214.84.212 145.215.77.196 91.244.123.5
135.39.124.13 128.111.239.240 111.51.194.150 179.90.134.251