Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.1.69.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.1.69.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:16:34 CST 2025
;; MSG SIZE  rcvd: 103
Host info
29.69.1.85.in-addr.arpa domain name pointer 29.69.1.85.dynamic.cust.swisscom.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
29.69.1.85.in-addr.arpa	name = 29.69.1.85.dynamic.cust.swisscom.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
153.126.187.46 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-06T18:29:28Z and 2020-10-06T18:35:31Z
2020-10-07 06:55:16
45.118.34.139 attackspam
mail auth brute force
2020-10-07 06:45:39
45.148.10.15 attackspambots
$f2bV_matches
2020-10-07 06:59:10
192.126.160.218 attack
Automatic report - Banned IP Access
2020-10-07 06:58:24
46.105.149.168 attackspambots
Oct  7 00:03:30 vpn01 sshd[4781]: Failed password for root from 46.105.149.168 port 60568 ssh2
...
2020-10-07 06:49:18
193.169.253.108 attackspambots
Brute forcing email accounts
2020-10-07 06:26:26
151.236.59.142 attackspam
TCP port : 4054
2020-10-07 06:46:30
108.188.199.237 attackspam
Automatic report - Banned IP Access
2020-10-07 06:34:32
49.233.130.95 attack
Oct  6 23:41:42 markkoudstaal sshd[21278]: Failed password for root from 49.233.130.95 port 58396 ssh2
Oct  6 23:45:12 markkoudstaal sshd[22225]: Failed password for root from 49.233.130.95 port 58336 ssh2
...
2020-10-07 06:28:12
45.172.234.137 attackbotsspam
mail auth brute force
2020-10-07 06:43:31
186.170.28.46 attackspam
Triggered by Fail2Ban at Ares web server
2020-10-07 06:38:53
185.188.183.248 attackbotsspam
Oct  6 20:16:20 haigwepa sshd[5195]: Failed password for root from 185.188.183.248 port 34322 ssh2
...
2020-10-07 06:56:48
109.72.192.78 attackspambots
Attempted Brute Force (dovecot)
2020-10-07 06:42:34
51.254.156.114 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 38 - port: 12183 proto: tcp cat: Misc Attackbytes: 60
2020-10-07 06:29:21
115.91.22.2 attackspam
20/10/5@16:42:19: FAIL: Alarm-Network address from=115.91.22.2
...
2020-10-07 06:32:37

Recently Reported IPs

70.81.253.187 68.26.121.67 154.2.155.65 63.191.133.115
201.214.56.229 17.83.158.249 46.216.87.66 167.153.195.148
210.39.218.209 141.127.44.134 72.218.107.169 160.130.55.165
23.217.191.100 244.190.107.171 168.92.47.178 66.251.246.187
29.20.134.149 90.153.61.237 50.151.195.120 133.88.180.79