Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.235.140.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.235.140.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:57:01 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 85.140.235.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.140.235.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.130.76.130 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2020-04-03 21:55:50
49.204.176.182 attackbots
Unauthorized connection attempt from IP address 49.204.176.182 on Port 445(SMB)
2020-04-03 21:40:32
220.141.2.7 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 03-04-2020 14:00:11.
2020-04-03 22:13:56
202.131.242.75 attack
Unauthorized connection attempt from IP address 202.131.242.75 on Port 445(SMB)
2020-04-03 21:38:44
36.84.37.184 attackbotsspam
Unauthorized connection attempt from IP address 36.84.37.184 on Port 445(SMB)
2020-04-03 21:59:31
157.245.104.96 attack
...
2020-04-03 21:40:04
122.144.134.27 attackspambots
2020-04-03T15:34:03.205217struts4.enskede.local sshd\[13755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.134.27  user=root
2020-04-03T15:34:06.628396struts4.enskede.local sshd\[13755\]: Failed password for root from 122.144.134.27 port 5447 ssh2
2020-04-03T15:36:45.498438struts4.enskede.local sshd\[13795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.134.27  user=root
2020-04-03T15:36:48.281595struts4.enskede.local sshd\[13795\]: Failed password for root from 122.144.134.27 port 5448 ssh2
2020-04-03T15:42:43.277004struts4.enskede.local sshd\[13911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.134.27  user=root
...
2020-04-03 22:15:08
159.203.111.100 attackspambots
Apr  3 14:42:56 ns382633 sshd\[1766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.111.100  user=root
Apr  3 14:42:58 ns382633 sshd\[1766\]: Failed password for root from 159.203.111.100 port 60253 ssh2
Apr  3 14:52:08 ns382633 sshd\[3634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.111.100  user=root
Apr  3 14:52:10 ns382633 sshd\[3634\]: Failed password for root from 159.203.111.100 port 42693 ssh2
Apr  3 15:00:40 ns382633 sshd\[5439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.111.100  user=root
2020-04-03 21:32:31
216.170.114.117 attackspambots
Unauthorized connection attempt from IP address 216.170.114.117 on Port 445(SMB)
2020-04-03 22:14:26
106.52.88.211 attackspambots
Apr  3 14:35:47 Ubuntu-1404-trusty-64-minimal sshd\[4638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.88.211  user=root
Apr  3 14:35:50 Ubuntu-1404-trusty-64-minimal sshd\[4638\]: Failed password for root from 106.52.88.211 port 38852 ssh2
Apr  3 14:57:34 Ubuntu-1404-trusty-64-minimal sshd\[21775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.88.211  user=root
Apr  3 14:57:36 Ubuntu-1404-trusty-64-minimal sshd\[21775\]: Failed password for root from 106.52.88.211 port 51304 ssh2
Apr  3 15:00:14 Ubuntu-1404-trusty-64-minimal sshd\[26504\]: Invalid user jianmo from 106.52.88.211
Apr  3 15:00:14 Ubuntu-1404-trusty-64-minimal sshd\[26504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.88.211
2020-04-03 22:08:27
74.82.63.52 attackbotsspam
Unauthorized connection attempt from IP address 74.82.63.52 on Port 445(SMB)
2020-04-03 21:37:26
144.217.214.100 attack
2020-04-03T09:00:11.873896mail.thespaminator.com sshd[5152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip100.ip-144-217-214.net  user=root
2020-04-03T09:00:14.237470mail.thespaminator.com sshd[5152]: Failed password for root from 144.217.214.100 port 50114 ssh2
...
2020-04-03 22:10:55
196.30.31.58 attackbots
2020-04-03T13:25:04.462363shield sshd\[6895\]: Invalid user h from 196.30.31.58 port 44348
2020-04-03T13:25:04.466023shield sshd\[6895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.30.31.58
2020-04-03T13:25:05.754313shield sshd\[6895\]: Failed password for invalid user h from 196.30.31.58 port 44348 ssh2
2020-04-03T13:29:09.688879shield sshd\[8390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.30.31.58  user=root
2020-04-03T13:29:11.609691shield sshd\[8390\]: Failed password for root from 196.30.31.58 port 59511 ssh2
2020-04-03 21:39:41
51.91.159.152 attackbots
2020-04-03T12:52:32.322826abusebot-8.cloudsearch.cf sshd[15472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.ip-51-91-159.eu  user=root
2020-04-03T12:52:34.639765abusebot-8.cloudsearch.cf sshd[15472]: Failed password for root from 51.91.159.152 port 52910 ssh2
2020-04-03T12:56:48.634392abusebot-8.cloudsearch.cf sshd[15697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.ip-51-91-159.eu  user=root
2020-04-03T12:56:50.760266abusebot-8.cloudsearch.cf sshd[15697]: Failed password for root from 51.91.159.152 port 45708 ssh2
2020-04-03T13:00:38.440594abusebot-8.cloudsearch.cf sshd[15890]: Invalid user softdev from 51.91.159.152 port 59050
2020-04-03T13:00:38.451198abusebot-8.cloudsearch.cf sshd[15890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.ip-51-91-159.eu
2020-04-03T13:00:38.440594abusebot-8.cloudsearch.cf sshd[15890]: Invalid user softdev from 51
...
2020-04-03 21:35:17
180.247.176.212 attackspambots
Unauthorized connection attempt from IP address 180.247.176.212 on Port 445(SMB)
2020-04-03 22:21:27

Recently Reported IPs

73.214.158.227 40.6.126.0 241.209.243.229 62.34.232.136
62.33.38.116 38.61.168.166 88.42.10.45 90.83.132.156
181.85.16.208 219.121.221.146 189.210.246.14 115.149.90.169
247.27.228.227 130.117.70.209 216.67.55.232 212.206.115.186
166.172.240.249 103.210.174.64 181.135.221.46 167.41.226.19