Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amherst

Region: Massachusetts

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Five College Net, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.85.213.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58202
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.85.213.85.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 21 21:47:18 CST 2019
;; MSG SIZE  rcvd: 117

Host info
85.213.85.148.in-addr.arpa domain name pointer dhcp-85.subnet-213.amherst.edu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
85.213.85.148.in-addr.arpa	name = dhcp-85.subnet-213.amherst.edu.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
190.14.36.152 attackspambots
" "
2019-10-04 19:19:34
222.186.173.180 attackbots
$f2bV_matches
2019-10-04 18:46:16
1.203.80.78 attack
Oct  4 10:16:26 microserver sshd[57143]: Invalid user Alaska2017 from 1.203.80.78 port 45827
Oct  4 10:16:26 microserver sshd[57143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.80.78
Oct  4 10:16:28 microserver sshd[57143]: Failed password for invalid user Alaska2017 from 1.203.80.78 port 45827 ssh2
Oct  4 10:22:14 microserver sshd[57868]: Invalid user P@$$word2019 from 1.203.80.78 port 35473
Oct  4 10:22:14 microserver sshd[57868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.80.78
Oct  4 10:33:42 microserver sshd[59293]: Invalid user Wachtwoord@123 from 1.203.80.78 port 43003
Oct  4 10:33:42 microserver sshd[59293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.80.78
Oct  4 10:33:44 microserver sshd[59293]: Failed password for invalid user Wachtwoord@123 from 1.203.80.78 port 43003 ssh2
Oct  4 10:39:31 microserver sshd[60038]: Invalid user Haslo@1234 from 1.203.
2019-10-04 18:52:03
61.219.140.192 attackspambots
firewall-block, port(s): 8080/tcp
2019-10-04 18:50:20
79.21.59.9 attack
firewall-block, port(s): 23/tcp
2019-10-04 18:49:07
164.132.100.28 attackbots
Invalid user tech from 164.132.100.28 port 44092
2019-10-04 18:48:36
133.130.119.178 attackbots
Oct  4 12:30:48 lnxmysql61 sshd[9215]: Failed password for root from 133.130.119.178 port 19405 ssh2
Oct  4 12:30:48 lnxmysql61 sshd[9215]: Failed password for root from 133.130.119.178 port 19405 ssh2
2019-10-04 19:20:23
106.51.98.159 attack
SSH invalid-user multiple login try
2019-10-04 18:58:22
201.55.126.57 attackspambots
Oct  4 12:26:02 dev0-dcde-rnet sshd[6787]: Failed password for root from 201.55.126.57 port 44795 ssh2
Oct  4 12:31:51 dev0-dcde-rnet sshd[6801]: Failed password for root from 201.55.126.57 port 37162 ssh2
2019-10-04 19:25:10
180.167.233.252 attackbotsspam
Oct  4 12:01:02 dev0-dcde-rnet sshd[6630]: Failed password for root from 180.167.233.252 port 36642 ssh2
Oct  4 12:04:48 dev0-dcde-rnet sshd[6641]: Failed password for root from 180.167.233.252 port 45544 ssh2
2019-10-04 18:47:55
162.247.74.204 attack
Oct  4 12:41:20 rotator sshd\[29963\]: Invalid user acoustic from 162.247.74.204Oct  4 12:41:23 rotator sshd\[29963\]: Failed password for invalid user acoustic from 162.247.74.204 port 43380 ssh2Oct  4 12:41:26 rotator sshd\[29963\]: Failed password for invalid user acoustic from 162.247.74.204 port 43380 ssh2Oct  4 12:41:30 rotator sshd\[29966\]: Invalid user acoustica from 162.247.74.204Oct  4 12:41:32 rotator sshd\[29966\]: Failed password for invalid user acoustica from 162.247.74.204 port 48604 ssh2Oct  4 12:41:35 rotator sshd\[29966\]: Failed password for invalid user acoustica from 162.247.74.204 port 48604 ssh2
...
2019-10-04 18:55:29
50.64.152.76 attackbots
Oct  4 12:47:25 MK-Soft-VM5 sshd[32311]: Failed password for root from 50.64.152.76 port 58484 ssh2
...
2019-10-04 19:08:15
45.136.109.193 attackspam
10/04/2019-05:48:24.697118 45.136.109.193 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-04 18:56:45
178.214.254.251 attackspam
Invalid user fv from 178.214.254.251 port 37176
2019-10-04 19:03:29
14.169.201.91 attackspam
Chat Spam
2019-10-04 18:51:37

Recently Reported IPs

7.148.50.35 210.216.244.144 15.234.63.241 110.167.120.211
95.174.236.36 149.35.61.140 186.92.248.122 208.96.152.243
126.153.208.35 223.221.185.239 88.132.206.174 131.128.191.185
69.43.12.97 96.150.51.35 115.179.218.239 139.91.57.75
151.71.180.174 115.1.185.12 140.183.173.127 97.105.201.124