Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: myLoc managed IT AG

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
Honeypot hit.
2019-10-24 06:54:14
attack
Many RDP login attempts detected by IDS script
2019-07-18 11:05:40
Comments on same subnet:
IP Type Details Datetime
85.14.245.40 attack
lfd: (smtpauth) Failed SMTP AUTH login from 85.14.245.40 (srv83039.dus2.fastwebserver.de): 5 in the last 3600 secs - Sun Jul 22 08:27:34 2018
2020-02-24 23:10:49
85.14.245.154 attackbots
Repeated RDP login failures. Last user: alex
2020-02-22 04:57:34
85.14.245.153 attackspam
scan r
2019-11-05 02:14:35
85.14.245.156 attack
webserver:80 [09/Oct/2019]  "\x03" 400 0
webserver:80 [09/Oct/2019]  "\x03" 400 0
webserver:80 [08/Oct/2019]  "\x03" 400 0
2019-10-10 04:49:24
85.14.245.221 attackbots
rdp
2019-10-05 00:04:30
85.14.245.158 attackbotsspam
Bruteforcing port 3389 (Remote Desktop) - Exceed maximum 10 attempts/hour
2019-07-14 09:35:56
85.14.245.157 attack
3389BruteforceFW22
2019-07-01 03:59:03
85.14.245.221 attackspambots
RDP Brute-Force (Grieskirchen RZ1)
2019-06-23 03:30:05
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.14.245.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20292
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.14.245.149.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071701 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 18 11:05:34 CST 2019
;; MSG SIZE  rcvd: 117
Host info
149.245.14.85.in-addr.arpa domain name pointer srv84068.dus2.fastwebserver.de.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
149.245.14.85.in-addr.arpa	name = srv84068.dus2.fastwebserver.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.248.163.203 attack
Scan port
2023-06-26 12:53:46
94.142.138.228 attack
marware host
2023-06-18 03:03:20
171.251.234.150 spam
Spam
2023-06-11 23:56:40
185.253.217.234 attack
Phishing
2023-06-12 21:31:03
185.224.128.126 attack
Scan port
2023-06-15 12:38:08
167.248.133.189 attackproxy
VPN fraud
2023-06-15 14:29:01
189.126.106.47 attack
Scan port
2023-07-03 12:59:52
89.248.165.239 attack
Scan port boot
2023-06-21 12:37:54
188.237.226.148 attack
Scan port
2023-06-15 17:59:06
89.248.163.16 spamattack
Scan port
2023-06-20 16:48:17
117.206.185.123 normal
">
2023-06-12 09:34:34
89.248.165.88 attack
Scan port
2023-06-13 18:12:57
117.206.185.123 normal
window.location.replace("http://www.w3schools.com");
2023-06-12 09:42:07
89.248.163.16 botsattack
Scan port
2023-06-22 19:36:01
185.173.35.1 spambotsattackproxy
Honey is a paypal thing i am victim of idenity theft useing paypal
2023-06-23 21:04:49

Recently Reported IPs

212.129.140.209 118.231.145.99 202.150.144.158 193.95.90.82
204.8.156.142 138.36.1.182 190.94.144.242 112.186.77.114
37.229.8.53 148.52.235.116 64.121.155.96 177.128.240.3
85.232.133.117 177.107.96.252 77.120.137.59 190.105.32.82
51.15.224.0 176.105.105.162 201.214.7.225 192.154.214.119