Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.85.218.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.85.218.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 21:46:33 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 139.218.85.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.218.85.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.181.167.115 attackbots
Dec 18 22:49:35 wh01 sshd[28864]: Failed password for root from 66.181.167.115 port 37548 ssh2
Dec 18 22:49:35 wh01 sshd[28864]: Received disconnect from 66.181.167.115 port 37548:11: Bye Bye [preauth]
Dec 18 22:49:35 wh01 sshd[28864]: Disconnected from 66.181.167.115 port 37548 [preauth]
Dec 18 23:02:11 wh01 sshd[30056]: Invalid user operator from 66.181.167.115 port 51814
Dec 18 23:02:11 wh01 sshd[30056]: Failed password for invalid user operator from 66.181.167.115 port 51814 ssh2
Dec 18 23:02:11 wh01 sshd[30056]: Received disconnect from 66.181.167.115 port 51814:11: Bye Bye [preauth]
Dec 18 23:02:11 wh01 sshd[30056]: Disconnected from 66.181.167.115 port 51814 [preauth]
Dec 18 23:26:23 wh01 sshd[32077]: Failed password for root from 66.181.167.115 port 52550 ssh2
Dec 18 23:26:23 wh01 sshd[32077]: Received disconnect from 66.181.167.115 port 52550:11: Bye Bye [preauth]
Dec 18 23:26:23 wh01 sshd[32077]: Disconnected from 66.181.167.115 port 52550 [preauth]
Dec 18 23:32:24 wh01 sshd[
2019-12-19 07:27:16
27.117.163.21 attackbotsspam
Dec 18 13:11:35 auw2 sshd\[20384\]: Invalid user admin from 27.117.163.21
Dec 18 13:11:35 auw2 sshd\[20384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.117.163.21
Dec 18 13:11:37 auw2 sshd\[20384\]: Failed password for invalid user admin from 27.117.163.21 port 47176 ssh2
Dec 18 13:17:59 auw2 sshd\[20919\]: Invalid user com from 27.117.163.21
Dec 18 13:17:59 auw2 sshd\[20919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.117.163.21
2019-12-19 07:23:00
176.223.138.252 attackbotsspam
SSH Login Bruteforce
2019-12-19 07:45:30
133.130.89.210 attackspam
Dec 18 23:31:06 tux-35-217 sshd\[6763\]: Invalid user qa from 133.130.89.210 port 58250
Dec 18 23:31:06 tux-35-217 sshd\[6763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.210
Dec 18 23:31:08 tux-35-217 sshd\[6763\]: Failed password for invalid user qa from 133.130.89.210 port 58250 ssh2
Dec 18 23:39:58 tux-35-217 sshd\[6919\]: Invalid user snead from 133.130.89.210 port 37208
Dec 18 23:39:58 tux-35-217 sshd\[6919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.210
...
2019-12-19 07:29:57
209.141.56.78 attackbotsspam
Dec 18 12:39:49 wbs sshd\[29817\]: Invalid user admin from 209.141.56.78
Dec 18 12:39:49 wbs sshd\[29817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.78
Dec 18 12:39:52 wbs sshd\[29817\]: Failed password for invalid user admin from 209.141.56.78 port 53773 ssh2
Dec 18 12:39:54 wbs sshd\[29817\]: Failed password for invalid user admin from 209.141.56.78 port 53773 ssh2
Dec 18 12:39:56 wbs sshd\[29817\]: Failed password for invalid user admin from 209.141.56.78 port 53773 ssh2
2019-12-19 07:30:57
193.70.39.175 attack
Dec 18 22:54:50 hcbbdb sshd\[26741\]: Invalid user test from 193.70.39.175
Dec 18 22:54:50 hcbbdb sshd\[26741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.ip-193-70-39.eu
Dec 18 22:54:52 hcbbdb sshd\[26741\]: Failed password for invalid user test from 193.70.39.175 port 54840 ssh2
Dec 18 22:59:48 hcbbdb sshd\[27324\]: Invalid user ternero from 193.70.39.175
Dec 18 22:59:48 hcbbdb sshd\[27324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.ip-193-70-39.eu
2019-12-19 07:19:45
49.88.112.63 attack
SSH bruteforce
2019-12-19 07:31:53
89.212.77.12 attackbotsspam
Invalid user elsje from 89.212.77.12 port 58774
2019-12-19 07:33:04
167.114.98.96 attack
Invalid user pi from 167.114.98.96 port 35272
2019-12-19 07:40:46
201.48.206.146 attackspambots
SSH auth scanning - multiple failed logins
2019-12-19 07:17:35
160.153.245.134 attackbotsspam
Dec 18 13:17:50 wbs sshd\[1503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-160-153-245-134.ip.secureserver.net  user=root
Dec 18 13:17:52 wbs sshd\[1503\]: Failed password for root from 160.153.245.134 port 38326 ssh2
Dec 18 13:23:58 wbs sshd\[2119\]: Invalid user adelina from 160.153.245.134
Dec 18 13:23:58 wbs sshd\[2119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-160-153-245-134.ip.secureserver.net
Dec 18 13:24:01 wbs sshd\[2119\]: Failed password for invalid user adelina from 160.153.245.134 port 49048 ssh2
2019-12-19 07:28:58
106.12.24.1 attack
Dec 18 13:39:55 wbs sshd\[3794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.1  user=root
Dec 18 13:39:57 wbs sshd\[3794\]: Failed password for root from 106.12.24.1 port 38152 ssh2
Dec 18 13:45:03 wbs sshd\[4287\]: Invalid user howerton from 106.12.24.1
Dec 18 13:45:03 wbs sshd\[4287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.1
Dec 18 13:45:05 wbs sshd\[4287\]: Failed password for invalid user howerton from 106.12.24.1 port 34304 ssh2
2019-12-19 07:45:19
115.238.95.194 attackbots
Dec 18 13:44:58 hpm sshd\[28679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.95.194  user=backup
Dec 18 13:45:01 hpm sshd\[28679\]: Failed password for backup from 115.238.95.194 port 2946 ssh2
Dec 18 13:50:51 hpm sshd\[29290\]: Invalid user David from 115.238.95.194
Dec 18 13:50:51 hpm sshd\[29290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.95.194
Dec 18 13:50:53 hpm sshd\[29290\]: Failed password for invalid user David from 115.238.95.194 port 2947 ssh2
2019-12-19 07:52:11
51.91.100.236 attackbotsspam
detected by Fail2Ban
2019-12-19 07:40:01
188.213.175.98 attackspam
Dec 19 00:09:13 mail sshd[31965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.175.98 
Dec 19 00:09:15 mail sshd[31965]: Failed password for invalid user preo from 188.213.175.98 port 57651 ssh2
Dec 19 00:18:30 mail sshd[1367]: Failed password for root from 188.213.175.98 port 54989 ssh2
2019-12-19 07:24:53

Recently Reported IPs

157.153.119.215 47.102.75.100 97.47.215.233 79.179.168.50
139.203.156.33 143.196.255.173 240.215.76.28 13.185.244.174
53.40.115.182 219.9.79.10 242.98.72.82 231.54.85.71
71.98.9.229 216.72.153.166 251.52.33.244 86.91.182.197
23.113.87.90 91.77.80.96 192.26.60.209 241.53.233.223