Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.0.220.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.0.220.30.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 05:22:53 CST 2025
;; MSG SIZE  rcvd: 104
Host info
30.220.0.85.in-addr.arpa domain name pointer 30.220.0.85.dynamic.cust.swisscom.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.220.0.85.in-addr.arpa	name = 30.220.0.85.dynamic.cust.swisscom.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.126.239.144 attackbotsspam
Icarus honeypot on github
2020-07-22 21:05:21
52.247.11.174 attackbotsspam
Unauthorized connection attempt detected from IP address 52.247.11.174 to port 1433
2020-07-22 20:51:49
13.82.236.59 attackspam
Unauthorized connection attempt detected from IP address 13.82.236.59 to port 1433
2020-07-22 20:36:50
67.158.52.41 attackspam
Unauthorized connection attempt detected from IP address 67.158.52.41 to port 445
2020-07-22 20:51:37
122.53.75.47 attack
Unauthorized connection attempt detected from IP address 122.53.75.47 to port 445
2020-07-22 20:47:05
35.142.135.68 attackbots
Unauthorized connection attempt detected from IP address 35.142.135.68 to port 80
2020-07-22 20:55:17
190.223.59.34 attack
Unauthorized connection attempt detected from IP address 190.223.59.34 to port 445
2020-07-22 20:41:19
201.130.154.2 attackbots
Unauthorized connection attempt detected from IP address 201.130.154.2 to port 9673
2020-07-22 21:01:26
69.197.161.210 attackspam
Unauthorized connection attempt detected from IP address 69.197.161.210 to port 3389
2020-07-22 21:13:55
46.99.199.95 attack
Unauthorized connection attempt detected from IP address 46.99.199.95 to port 445
2020-07-22 20:33:35
193.169.253.37 attackspambots
Unauthorized connection attempt detected from IP address 193.169.253.37 to port 25
2020-07-22 21:01:57
221.235.136.33 attackspam
Unauthorized connection attempt detected from IP address 221.235.136.33 to port 23
2020-07-22 20:39:10
223.247.194.119 attackspam
" "
2020-07-22 20:37:40
222.186.15.115 attackbotsspam
2020-07-22T15:54:56.210104lavrinenko.info sshd[14169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
2020-07-22T15:54:58.296291lavrinenko.info sshd[14169]: Failed password for root from 222.186.15.115 port 40646 ssh2
2020-07-22T15:54:56.210104lavrinenko.info sshd[14169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
2020-07-22T15:54:58.296291lavrinenko.info sshd[14169]: Failed password for root from 222.186.15.115 port 40646 ssh2
2020-07-22T15:55:02.974639lavrinenko.info sshd[14169]: Failed password for root from 222.186.15.115 port 40646 ssh2
...
2020-07-22 20:57:33
165.22.122.68 attackspam
Unauthorized connection attempt detected from IP address 165.22.122.68 to port 8895
2020-07-22 21:07:22

Recently Reported IPs

82.77.20.188 9.16.189.54 233.82.48.227 210.27.115.246
234.231.34.72 225.197.16.78 214.169.6.228 55.246.6.80
60.209.131.141 159.239.91.104 239.62.77.184 206.30.56.111
249.87.255.0 81.70.34.252 68.212.54.7 252.57.139.142
50.236.179.255 146.248.146.224 118.141.150.40 157.153.133.57