Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.120.211.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.120.211.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 17:26:54 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 85.211.120.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.211.120.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.31.16.243 attackbotsspam
...
2020-05-07 01:34:13
185.216.140.6 attack
05/06/2020-13:42:29.987130 185.216.140.6 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-07 02:03:48
194.61.27.241 attack
Port scan: Attack repeated for 24 hours
2020-05-07 01:46:54
139.59.211.245 attack
(sshd) Failed SSH login from 139.59.211.245 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  6 18:29:16 srv sshd[12256]: Invalid user peer from 139.59.211.245 port 50050
May  6 18:29:19 srv sshd[12256]: Failed password for invalid user peer from 139.59.211.245 port 50050 ssh2
May  6 18:40:44 srv sshd[12559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.211.245  user=root
May  6 18:40:46 srv sshd[12559]: Failed password for root from 139.59.211.245 port 47350 ssh2
May  6 18:48:49 srv sshd[13463]: Invalid user mir from 139.59.211.245 port 57544
2020-05-07 01:58:03
194.31.244.50 attackspambots
May  6 19:52:04 debian-2gb-nbg1-2 kernel: \[11046413.738261\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.31.244.50 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=48024 PROTO=TCP SPT=50046 DPT=3399 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-07 02:01:01
68.183.88.186 attack
$f2bV_matches
2020-05-07 01:39:14
134.209.63.140 attackbotsspam
26470/tcp 18616/tcp 26672/tcp...
[2020-03-21/05-06]246pkt,85pt.(tcp)
2020-05-07 01:59:29
49.49.212.242 attackbotsspam
1588766314 - 05/06/2020 13:58:34 Host: 49.49.212.242/49.49.212.242 Port: 445 TCP Blocked
2020-05-07 01:31:22
178.62.118.53 attackspambots
May  6 17:18:47 ip-172-31-62-245 sshd\[17961\]: Invalid user peter from 178.62.118.53\
May  6 17:18:50 ip-172-31-62-245 sshd\[17961\]: Failed password for invalid user peter from 178.62.118.53 port 46083 ssh2\
May  6 17:23:45 ip-172-31-62-245 sshd\[18047\]: Invalid user oracle from 178.62.118.53\
May  6 17:23:47 ip-172-31-62-245 sshd\[18047\]: Failed password for invalid user oracle from 178.62.118.53 port 36563 ssh2\
May  6 17:28:36 ip-172-31-62-245 sshd\[18132\]: Invalid user xhy from 178.62.118.53\
2020-05-07 01:38:07
182.253.17.92 attackspambots
RDP Brute-Force (Grieskirchen RZ2)
2020-05-07 01:35:30
61.234.48.7 attack
May  6 14:45:07 h2779839 sshd[21562]: Invalid user alexis from 61.234.48.7 port 39227
May  6 14:45:07 h2779839 sshd[21562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.234.48.7
May  6 14:45:07 h2779839 sshd[21562]: Invalid user alexis from 61.234.48.7 port 39227
May  6 14:45:09 h2779839 sshd[21562]: Failed password for invalid user alexis from 61.234.48.7 port 39227 ssh2
May  6 14:49:01 h2779839 sshd[21583]: Invalid user user from 61.234.48.7 port 58124
May  6 14:49:01 h2779839 sshd[21583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.234.48.7
May  6 14:49:01 h2779839 sshd[21583]: Invalid user user from 61.234.48.7 port 58124
May  6 14:49:03 h2779839 sshd[21583]: Failed password for invalid user user from 61.234.48.7 port 58124 ssh2
May  6 14:52:45 h2779839 sshd[21608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.234.48.7  user=root
May  6 14:52:48
...
2020-05-07 01:19:00
85.239.35.161 attackspam
May  6 19:18:27 debian64 sshd[31763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.239.35.161 
...
2020-05-07 01:28:05
92.38.26.151 attackspam
Automatic report - Port Scan
2020-05-07 01:30:30
181.55.188.187 attackbotsspam
May  6 11:49:43 debian sshd[6319]: Unable to negotiate with 181.55.188.187 port 17672: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
May  6 12:54:43 debian sshd[9344]: Unable to negotiate with 181.55.188.187 port 17672: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
...
2020-05-07 01:37:48
200.94.242.233 attackbots
scans 2 times in preceeding hours on the ports (in chronological order) 8080 8080
2020-05-07 01:43:20

Recently Reported IPs

54.244.68.252 131.99.74.179 125.163.226.249 46.8.37.49
43.174.13.124 82.123.134.254 164.4.87.63 233.187.253.49
223.21.20.121 139.126.210.76 186.218.182.228 64.51.236.150
30.95.14.144 67.201.124.147 18.237.9.70 212.181.253.59
235.249.121.139 2.194.3.164 19.61.3.104 52.6.138.100