Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: Daimler AG

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.85.157.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59894
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;53.85.157.69.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri May 03 22:03:58 +08 2019
;; MSG SIZE  rcvd: 116

Host info
Host 69.157.85.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 69.157.85.53.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
128.199.83.103 attack
Brute force SMTP login attempted.
...
2019-08-10 10:45:12
129.150.112.159 attackbots
Brute force SMTP login attempted.
...
2019-08-10 10:14:08
18.18.248.17 attackspam
ssh failed login
2019-08-10 10:23:09
134.119.189.29 attackbots
Unauthorized access detected from banned ip
2019-08-10 10:29:12
23.129.64.193 attack
SSH bruteforce
2019-08-10 10:05:52
96.69.10.237 attackbotsspam
Aug  9 23:38:58 lnxded63 sshd[8275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.10.237
2019-08-10 10:24:51
179.124.214.224 attackbots
port scan and connect, tcp 80 (http)
2019-08-10 10:03:08
212.227.15.14 attackbots
Aufgepasst: Immobilienpreise auf Rekordhoch
2019-08-10 10:43:24
146.185.175.132 attack
Aug  9 17:30:54 cac1d2 sshd\[15292\]: Invalid user hong from 146.185.175.132 port 39336
Aug  9 17:30:54 cac1d2 sshd\[15292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.175.132
Aug  9 17:30:56 cac1d2 sshd\[15292\]: Failed password for invalid user hong from 146.185.175.132 port 39336 ssh2
...
2019-08-10 10:21:11
171.50.174.215 attackbotsspam
Automatic report - Port Scan Attack
2019-08-10 10:43:41
177.124.231.28 attackbots
Aug 10 04:01:34 cp sshd[4775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.231.28
Aug 10 04:01:34 cp sshd[4775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.231.28
2019-08-10 10:35:27
129.146.121.201 attackbots
Brute force SMTP login attempted.
...
2019-08-10 10:15:22
134.175.154.93 attack
Aug 10 03:05:21 icinga sshd[31209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.154.93
Aug 10 03:05:23 icinga sshd[31209]: Failed password for invalid user mg from 134.175.154.93 port 40366 ssh2
...
2019-08-10 10:25:50
167.99.38.73 attackspam
08/09/2019-21:36:16.434437 167.99.38.73 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-10 10:09:40
106.12.121.212 attackspambots
2019-08-10T02:11:03.806565abusebot-4.cloudsearch.cf sshd\[18998\]: Invalid user lx from 106.12.121.212 port 57902
2019-08-10 10:21:44

Recently Reported IPs

46.78.201.212 175.112.242.134 13.226.99.30 192.219.34.98
31.180.150.200 186.144.20.108 23.70.103.116 84.1.222.167
162.218.64.59 176.111.101.132 200.131.6.7 72.4.37.174
80.183.250.81 221.227.185.146 245.18.190.72 68.215.113.32
126.14.183.211 185.136.156.41 89.34.152.141 198.214.57.254