Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.82.239.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9799
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.82.239.89.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 00:48:49 CST 2025
;; MSG SIZE  rcvd: 105
Host info
89.239.82.85.in-addr.arpa domain name pointer 085082239089.dynamic.telenor.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
89.239.82.85.in-addr.arpa	name = 085082239089.dynamic.telenor.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
85.214.95.237 attackspam
Invalid user admin from 85.214.95.237 port 55200
2019-10-24 22:49:39
109.132.226.86 attackbots
Oct 24 04:26:28 auw2 sshd\[23927\]: Invalid user pi from 109.132.226.86
Oct 24 04:26:28 auw2 sshd\[23931\]: Invalid user pi from 109.132.226.86
Oct 24 04:26:28 auw2 sshd\[23927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.132.226.86
Oct 24 04:26:28 auw2 sshd\[23931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.132.226.86
Oct 24 04:26:31 auw2 sshd\[23927\]: Failed password for invalid user pi from 109.132.226.86 port 58506 ssh2
2019-10-24 22:44:23
183.111.227.5 attack
2019-10-24T13:50:06.244053homeassistant sshd[26232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.227.5  user=root
2019-10-24T13:50:08.200389homeassistant sshd[26232]: Failed password for root from 183.111.227.5 port 48572 ssh2
...
2019-10-24 22:33:01
170.245.49.126 attack
Invalid user pi from 170.245.49.126 port 42292
2019-10-24 22:34:55
54.39.18.237 attackspam
Invalid user support from 54.39.18.237 port 49942
2019-10-24 22:23:31
139.155.34.87 attackspambots
Invalid user support from 139.155.34.87 port 39278
2019-10-24 23:06:08
192.99.56.117 attackbotsspam
Invalid user ubuntu from 192.99.56.117 port 34076
2019-10-24 23:01:43
106.75.176.111 attack
Invalid user ayesha from 106.75.176.111 port 59094
2019-10-24 23:11:42
41.76.169.43 attackspam
Invalid user developer from 41.76.169.43 port 55214
2019-10-24 22:25:15
152.32.146.169 attack
Invalid user slview from 152.32.146.169 port 53154
2019-10-24 22:36:58
54.38.241.171 attackspambots
Invalid user spamd from 54.38.241.171 port 57444
2019-10-24 22:53:54
149.202.206.206 attackbotsspam
Invalid user teamspeak from 149.202.206.206 port 53954
2019-10-24 22:37:48
106.54.226.23 attack
Invalid user michael from 106.54.226.23 port 42102
2019-10-24 22:45:38
185.216.140.252 attack
ET DROP Dshield Block Listed Source group 1 - port: 8251 proto: TCP cat: Misc Attack
2019-10-24 23:03:12
94.23.50.194 attackbotsspam
Invalid user applmgr from 94.23.50.194 port 36607
2019-10-24 22:48:34

Recently Reported IPs

64.174.26.134 246.196.198.72 81.38.134.23 225.160.13.57
22.59.93.223 250.204.75.226 92.142.85.126 50.29.241.43
250.92.146.54 36.71.145.95 241.51.43.80 207.99.76.226
13.118.67.81 156.146.104.238 116.233.103.72 68.188.22.39
244.70.200.20 92.250.159.137 62.174.56.9 24.61.45.82