Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.85.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.201.85.221.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:39:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
221.85.201.138.in-addr.arpa domain name pointer static.221.85.201.138.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
221.85.201.138.in-addr.arpa	name = static.221.85.201.138.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.230.235.233 attackspambots
Mar 22 17:40:09 ns382633 sshd\[7204\]: Invalid user bi from 157.230.235.233 port 46434
Mar 22 17:40:09 ns382633 sshd\[7204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233
Mar 22 17:40:11 ns382633 sshd\[7204\]: Failed password for invalid user bi from 157.230.235.233 port 46434 ssh2
Mar 22 17:44:19 ns382633 sshd\[7732\]: Invalid user info from 157.230.235.233 port 43684
Mar 22 17:44:19 ns382633 sshd\[7732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233
2020-03-23 02:09:05
222.186.180.142 attack
Mar 22 13:42:47 plusreed sshd[4706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
Mar 22 13:42:49 plusreed sshd[4706]: Failed password for root from 222.186.180.142 port 57602 ssh2
...
2020-03-23 01:43:26
178.34.190.34 attackspam
Invalid user se from 178.34.190.34 port 3457
2020-03-23 02:08:01
207.154.250.23 attackspam
Mar 22 18:38:29 hosting180 sshd[25696]: Invalid user xd from 207.154.250.23 port 55286
...
2020-03-23 01:58:25
189.203.160.201 attack
Invalid user admin from 189.203.160.201 port 59329
2020-03-23 02:03:16
121.199.37.87 attackspambots
Rude login attack (4 tries in 1d)
2020-03-23 01:35:28
51.255.132.213 attackspambots
20 attempts against mh-ssh on cloud
2020-03-23 01:52:37
186.146.76.21 attackbotsspam
k+ssh-bruteforce
2020-03-23 02:04:54
45.117.169.89 attack
Mar 22 09:57:19 firewall sshd[28975]: Invalid user cj from 45.117.169.89
Mar 22 09:57:21 firewall sshd[28975]: Failed password for invalid user cj from 45.117.169.89 port 37206 ssh2
Mar 22 09:59:40 firewall sshd[29036]: Invalid user pass from 45.117.169.89
...
2020-03-23 01:33:25
178.176.30.211 attackspambots
Invalid user shijie from 178.176.30.211 port 35054
2020-03-23 02:07:08
117.6.135.250 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-23 02:13:37
133.242.53.108 attack
Invalid user david from 133.242.53.108 port 40778
2020-03-23 01:34:11
5.249.155.183 attackbotsspam
Invalid user install from 5.249.155.183 port 41970
2020-03-23 01:45:34
190.64.204.140 attack
Total attacks: 2
2020-03-23 02:03:01
144.76.173.246 attack
Invalid user root1 from 144.76.173.246 port 51118
2020-03-23 02:10:31

Recently Reported IPs

138.201.85.172 138.201.85.37 138.201.88.75 118.175.228.152
138.201.87.7 138.201.84.59 138.201.86.11 138.201.87.68
138.201.86.197 138.201.85.148 138.201.9.118 118.175.228.154
118.175.228.155 118.175.228.157 118.175.228.158 118.175.228.16
138.204.186.85 138.204.186.97 138.204.188.70 138.204.184.47