Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: UPC Schweiz GmbH

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbotsspam
Automatic report - Banned IP Access
2020-06-01 02:53:05
attackspam
Automatic report - Banned IP Access
2020-05-05 03:02:29
attackbotsspam
Automatic report - Port Scan Attack
2019-10-05 07:32:00
attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/80.218.89.85/ 
 DE - 1H : (143)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : DE 
 NAME ASN : ASN6830 
 
 IP : 80.218.89.85 
 
 CIDR : 80.218.0.0/16 
 
 PREFIX COUNT : 755 
 
 UNIQUE IP COUNT : 12137216 
 
 
 WYKRYTE ATAKI Z ASN6830 :  
  1H - 3 
  3H - 6 
  6H - 12 
 12H - 21 
 24H - 25 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 04:36:37
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.218.89.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7771
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.218.89.85.			IN	A

;; AUTHORITY SECTION:
.			533	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092301 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 24 04:36:34 CST 2019
;; MSG SIZE  rcvd: 116
Host info
85.89.218.80.in-addr.arpa domain name pointer 80-218-89-85.dclient.hispeed.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.89.218.80.in-addr.arpa	name = 80-218-89-85.dclient.hispeed.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
60.178.151.179 attackbots
DATE:2019-09-29 14:02:36, IP:60.178.151.179, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2019-09-30 03:07:08
125.128.125.86 attack
34567/tcp
[2019-09-29]1pkt
2019-09-30 03:16:08
118.98.122.202 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/118.98.122.202/ 
 ID - 1H : (171)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ID 
 NAME ASN : ASN17974 
 
 IP : 118.98.122.202 
 
 CIDR : 118.98.120.0/22 
 
 PREFIX COUNT : 1456 
 
 UNIQUE IP COUNT : 1245952 
 
 
 WYKRYTE ATAKI Z ASN17974 :  
  1H - 1 
  3H - 3 
  6H - 6 
 12H - 13 
 24H - 26 
 
 INFO : Port SERVER 80 Scan Detected and Blocked by ADMIN  - data recovery
2019-09-30 03:31:02
45.63.91.188 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/45.63.91.188/ 
 US - 1H : (1656)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN20473 
 
 IP : 45.63.91.188 
 
 CIDR : 45.63.80.0/20 
 
 PREFIX COUNT : 584 
 
 UNIQUE IP COUNT : 939776 
 
 
 WYKRYTE ATAKI Z ASN20473 :  
  1H - 1 
  3H - 2 
  6H - 11 
 12H - 16 
 24H - 32 
 
 INFO : Looking for resource vulnerabilities 403 Detected and Blocked by ADMIN  - data recovery
2019-09-30 03:35:02
62.234.23.78 attackspambots
ssh intrusion attempt
2019-09-30 03:06:51
193.56.28.143 attackspam
Sep 29 14:15:55 web1 postfix/smtpd[18399]: warning: unknown[193.56.28.143]: SASL LOGIN authentication failed: authentication failure
Sep 29 14:15:56 web1 postfix/smtpd[18399]: warning: unknown[193.56.28.143]: SASL LOGIN authentication failed: authentication failure
...
2019-09-30 03:07:34
125.185.220.13 attackbotsspam
Sep 29 20:47:57 dev0-dcfr-rnet sshd[30402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.185.220.13
Sep 29 20:47:59 dev0-dcfr-rnet sshd[30402]: Failed password for invalid user resumix from 125.185.220.13 port 36664 ssh2
Sep 29 21:02:32 dev0-dcfr-rnet sshd[30462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.185.220.13
2019-09-30 03:03:01
123.125.71.39 attack
Automatic report - Banned IP Access
2019-09-30 03:10:11
220.134.168.152 attackbots
23/tcp 23/tcp
[2019-09-29]2pkt
2019-09-30 03:30:42
93.122.201.229 attackspam
34567/tcp
[2019-09-29]1pkt
2019-09-30 03:06:06
115.79.199.107 attack
Unauthorized connection attempt from IP address 115.79.199.107 on Port 445(SMB)
2019-09-30 03:19:56
183.131.116.153 attackbots
Unauthorized connection attempt from IP address 183.131.116.153 on Port 445(SMB)
2019-09-30 03:21:36
121.60.54.35 attack
Automated reporting of FTP Brute Force
2019-09-30 03:08:13
87.123.34.64 attackbotsspam
Sep 29 20:25:25 MK-Soft-VM7 sshd[2395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.123.34.64 
Sep 29 20:25:27 MK-Soft-VM7 sshd[2395]: Failed password for invalid user user1 from 87.123.34.64 port 54766 ssh2
...
2019-09-30 03:30:22
164.160.225.238 attackspambots
8080/tcp
[2019-09-29]1pkt
2019-09-30 03:10:59

Recently Reported IPs

36.232.182.141 31.135.182.92 36.224.248.149 14.167.220.25
37.155.33.215 173.225.102.97 113.172.188.149 122.160.96.58
43.229.90.196 192.12.112.102 113.184.26.137 31.200.193.33
77.37.231.85 37.130.156.36 1.170.82.41 236.144.193.22
71.40.80.50 137.242.166.230 93.210.47.181 156.198.181.22