Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.140.81.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38299
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.140.81.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 19:04:00 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 85.81.140.133.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.81.140.133.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.55.206.241 attack
Feb  2 06:55:44 mout sshd[2004]: Invalid user teste from 45.55.206.241 port 54158
2020-02-02 20:16:23
131.221.80.161 attack
Unauthorized connection attempt detected from IP address 131.221.80.161 to port 2220 [J]
2020-02-02 20:51:43
218.92.0.199 attack
Feb  2 11:06:05 dcd-gentoo sshd[16876]: User root from 218.92.0.199 not allowed because none of user's groups are listed in AllowGroups
Feb  2 11:06:08 dcd-gentoo sshd[16876]: error: PAM: Authentication failure for illegal user root from 218.92.0.199
Feb  2 11:06:05 dcd-gentoo sshd[16876]: User root from 218.92.0.199 not allowed because none of user's groups are listed in AllowGroups
Feb  2 11:06:08 dcd-gentoo sshd[16876]: error: PAM: Authentication failure for illegal user root from 218.92.0.199
Feb  2 11:06:05 dcd-gentoo sshd[16876]: User root from 218.92.0.199 not allowed because none of user's groups are listed in AllowGroups
Feb  2 11:06:08 dcd-gentoo sshd[16876]: error: PAM: Authentication failure for illegal user root from 218.92.0.199
Feb  2 11:06:08 dcd-gentoo sshd[16876]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.199 port 58042 ssh2
...
2020-02-02 20:39:32
144.217.243.216 attackspambots
Unauthorized connection attempt detected from IP address 144.217.243.216 to port 2220 [J]
2020-02-02 20:44:07
182.61.55.154 attackbotsspam
Unauthorized connection attempt detected from IP address 182.61.55.154 to port 2220 [J]
2020-02-02 20:52:06
104.244.73.223 attackspam
Dec 25 21:57:23 ms-srv sshd[51275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.73.223
Dec 25 21:57:25 ms-srv sshd[51275]: Failed password for invalid user test from 104.244.73.223 port 45090 ssh2
2020-02-02 20:31:59
40.126.120.71 attack
Unauthorized connection attempt detected from IP address 40.126.120.71 to port 2220 [J]
2020-02-02 20:39:07
211.171.186.98 attackspam
Feb  2 13:06:50 mout sshd[2213]: Invalid user sinusbot1 from 211.171.186.98 port 58180
2020-02-02 20:51:25
159.65.144.64 attack
Unauthorized connection attempt detected from IP address 159.65.144.64 to port 2220 [J]
2020-02-02 20:38:55
54.36.163.188 attackbotsspam
Unauthorized connection attempt detected from IP address 54.36.163.188 to port 2220 [J]
2020-02-02 20:17:12
52.65.15.196 attackspambots
C1,WP GET /digitale-produkte/blog/wp-login.php
GET /digitale-produkte/wp-login.php
GET /digitale-produkte/wordpress/wp-login.php
2020-02-02 20:50:36
222.186.180.17 attack
Fail2Ban Ban Triggered (2)
2020-02-02 20:24:16
187.54.67.130 attackspambots
Unauthorized connection attempt detected from IP address 187.54.67.130 to port 2220 [J]
2020-02-02 20:24:45
181.92.250.205 attackbotsspam
Feb  2 07:37:34 server sshd\[15675\]: Invalid user  from 181.92.250.205
Feb  2 07:37:34 server sshd\[15675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.92.250.205 
Feb  2 07:37:37 server sshd\[15675\]: Failed password for invalid user  from 181.92.250.205 port 50272 ssh2
Feb  2 07:49:58 server sshd\[18506\]: Invalid user  from 181.92.250.205
Feb  2 07:49:58 server sshd\[18506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.92.250.205 
...
2020-02-02 20:16:01
112.85.42.181 attack
Feb  2 13:06:52 vps691689 sshd[14569]: Failed password for root from 112.85.42.181 port 13866 ssh2
Feb  2 13:06:56 vps691689 sshd[14569]: Failed password for root from 112.85.42.181 port 13866 ssh2
Feb  2 13:07:06 vps691689 sshd[14569]: error: maximum authentication attempts exceeded for root from 112.85.42.181 port 13866 ssh2 [preauth]
...
2020-02-02 20:18:00

Recently Reported IPs

43.233.5.78 174.130.197.134 222.249.11.5 66.167.6.89
9.186.172.94 133.45.55.59 33.215.222.205 6.1.104.119
200.20.131.247 116.176.114.97 197.105.77.190 81.196.229.190
251.8.183.67 172.121.217.59 93.167.191.210 193.71.42.116
8.169.45.212 231.18.113.167 4.81.191.237 5.242.159.247