Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.122.39.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46378
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.122.39.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 10:37:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 66.39.122.85.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.39.122.85.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.14.69.53 attack
failed_logins
2020-05-14 23:25:06
41.33.45.51 attackbotsspam
2020-05-14T14:45:48Z - RDP login failed multiple times. (41.33.45.51)
2020-05-14 23:07:25
196.218.2.110 attackbots
DATE:2020-05-14 14:26:15, IP:196.218.2.110, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-05-14 23:18:39
220.134.3.173 attack
scan z
2020-05-14 23:07:44
222.186.169.194 attackspambots
2020-05-14T11:48:34.408198xentho-1 sshd[419994]: Failed password for root from 222.186.169.194 port 13362 ssh2
2020-05-14T11:48:28.165087xentho-1 sshd[419994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
2020-05-14T11:48:30.122954xentho-1 sshd[419994]: Failed password for root from 222.186.169.194 port 13362 ssh2
2020-05-14T11:48:34.408198xentho-1 sshd[419994]: Failed password for root from 222.186.169.194 port 13362 ssh2
2020-05-14T11:48:38.693095xentho-1 sshd[419994]: Failed password for root from 222.186.169.194 port 13362 ssh2
2020-05-14T11:48:28.165087xentho-1 sshd[419994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
2020-05-14T11:48:30.122954xentho-1 sshd[419994]: Failed password for root from 222.186.169.194 port 13362 ssh2
2020-05-14T11:48:34.408198xentho-1 sshd[419994]: Failed password for root from 222.186.169.194 port 13362 ssh2
2020-0
...
2020-05-14 23:49:53
41.223.142.211 attack
SSH Brute-Force attacks
2020-05-14 23:27:24
170.150.72.28 attackbotsspam
May 14 17:40:24 abendstille sshd\[30555\]: Invalid user wkadmin from 170.150.72.28
May 14 17:40:24 abendstille sshd\[30555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.150.72.28
May 14 17:40:26 abendstille sshd\[30555\]: Failed password for invalid user wkadmin from 170.150.72.28 port 57800 ssh2
May 14 17:44:47 abendstille sshd\[2253\]: Invalid user event from 170.150.72.28
May 14 17:44:47 abendstille sshd\[2253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.150.72.28
...
2020-05-14 23:47:41
200.146.232.97 attackbots
May 14 15:09:32 OPSO sshd\[17842\]: Invalid user richard from 200.146.232.97 port 46774
May 14 15:09:32 OPSO sshd\[17842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.232.97
May 14 15:09:34 OPSO sshd\[17842\]: Failed password for invalid user richard from 200.146.232.97 port 46774 ssh2
May 14 15:13:47 OPSO sshd\[18908\]: Invalid user eas from 200.146.232.97 port 39961
May 14 15:13:47 OPSO sshd\[18908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.232.97
2020-05-14 23:39:54
186.121.204.10 attackbotsspam
May 14 14:33:31 vps687878 sshd\[29083\]: Failed password for invalid user oracle from 186.121.204.10 port 50640 ssh2
May 14 14:37:37 vps687878 sshd\[29509\]: Invalid user ubuntu from 186.121.204.10 port 56150
May 14 14:37:37 vps687878 sshd\[29509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.121.204.10
May 14 14:37:39 vps687878 sshd\[29509\]: Failed password for invalid user ubuntu from 186.121.204.10 port 56150 ssh2
May 14 14:41:42 vps687878 sshd\[29977\]: Invalid user musikbot from 186.121.204.10 port 33382
May 14 14:41:42 vps687878 sshd\[29977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.121.204.10
...
2020-05-14 23:26:23
103.81.115.71 attackspambots
20/5/14@08:25:53: FAIL: Alarm-Network address from=103.81.115.71
...
2020-05-14 23:41:28
106.13.167.62 attackbotsspam
$f2bV_matches
2020-05-14 23:51:18
118.25.96.30 attack
May 14 14:07:29 124388 sshd[18329]: Invalid user gma from 118.25.96.30 port 59189
May 14 14:07:29 124388 sshd[18329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.96.30
May 14 14:07:29 124388 sshd[18329]: Invalid user gma from 118.25.96.30 port 59189
May 14 14:07:31 124388 sshd[18329]: Failed password for invalid user gma from 118.25.96.30 port 59189 ssh2
May 14 14:11:16 124388 sshd[18398]: Invalid user admin from 118.25.96.30 port 39530
2020-05-14 23:44:24
43.227.64.39 attackbotsspam
Lines containing failures of 43.227.64.39
May 14 04:13:13 kmh-sql-001-nbg01 sshd[2022]: Invalid user userftp from 43.227.64.39 port 34582
May 14 04:13:13 kmh-sql-001-nbg01 sshd[2022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.227.64.39 
May 14 04:13:16 kmh-sql-001-nbg01 sshd[2022]: Failed password for invalid user userftp from 43.227.64.39 port 34582 ssh2
May 14 04:13:17 kmh-sql-001-nbg01 sshd[2022]: Received disconnect from 43.227.64.39 port 34582:11: Bye Bye [preauth]
May 14 04:13:17 kmh-sql-001-nbg01 sshd[2022]: Disconnected from invalid user userftp 43.227.64.39 port 34582 [preauth]
May 14 04:24:48 kmh-sql-001-nbg01 sshd[5891]: Invalid user ak from 43.227.64.39 port 50662
May 14 04:24:48 kmh-sql-001-nbg01 sshd[5891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.227.64.39 
May 14 04:24:50 kmh-sql-001-nbg01 sshd[5891]: Failed password for invalid user ak from 43.227.64.39 por........
------------------------------
2020-05-14 23:20:41
173.212.213.46 attackspam
[portscan] Port scan
2020-05-14 23:43:50
177.228.96.152 attackbotsspam
query: pizzaseo.com IN RRSIG +
2020-05-14 23:33:07

Recently Reported IPs

28.90.167.218 115.20.212.234 244.74.173.72 203.169.53.149
107.199.176.124 139.50.137.7 109.39.118.143 45.136.52.107
185.29.70.188 84.43.50.146 155.111.230.2 192.205.72.173
212.145.35.122 16.4.9.255 192.173.91.196 80.176.17.195
181.246.60.12 206.252.153.188 22.50.111.191 136.2.163.119