Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oviedo

Region: Comunidad Autónoma del Principado de Asturias

Country: Spain

Internet Service Provider: TeleCable

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.152.139.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28064
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.152.139.135.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 09:21:31 CST 2025
;; MSG SIZE  rcvd: 107
Host info
135.139.152.85.in-addr.arpa domain name pointer cm-staticip-85-152-139-135.telecable.es.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.139.152.85.in-addr.arpa	name = cm-staticip-85-152-139-135.telecable.es.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
148.72.232.1 attackspambots
Automatic report - Web App Attack
2019-07-09 15:56:50
112.246.56.143 attackbotsspam
Caught in portsentry honeypot
2019-07-09 16:02:08
163.53.75.227 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 12:41:24,109 INFO [shellcode_manager] (163.53.75.227) no match, writing hexdump (1a4b96612f4c09583a235e36772c8888 :1504) - SMB (Unknown)
2019-07-09 16:40:08
59.173.8.178 attackspambots
Jul  8 22:52:12 xb3 sshd[8413]: reveeclipse mapping checking getaddrinfo for 178.8.173.59.broad.wh.hb.dynamic.163data.com.cn [59.173.8.178] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  8 22:52:14 xb3 sshd[8413]: Failed password for invalid user view from 59.173.8.178 port 48920 ssh2
Jul  8 22:52:14 xb3 sshd[8413]: Received disconnect from 59.173.8.178: 11: Bye Bye [preauth]
Jul  8 23:01:51 xb3 sshd[2294]: reveeclipse mapping checking getaddrinfo for 178.8.173.59.broad.wh.hb.dynamic.163data.com.cn [59.173.8.178] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  8 23:01:53 xb3 sshd[2294]: Failed password for invalid user stats from 59.173.8.178 port 59929 ssh2
Jul  8 23:01:53 xb3 sshd[2294]: Received disconnect from 59.173.8.178: 11: Bye Bye [preauth]
Jul  8 23:02:45 xb3 sshd[5344]: reveeclipse mapping checking getaddrinfo for 178.8.173.59.broad.wh.hb.dynamic.163data.com.cn [59.173.8.178] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  8 23:02:47 xb3 sshd[5344]: Failed password for invalid u........
-------------------------------
2019-07-09 16:05:04
222.188.98.43 attackspambots
Jul  7 22:34:00 ip-172-31-1-72 sshd[28465]: Invalid user vc from 222.188.98.43
Jul  7 22:34:00 ip-172-31-1-72 sshd[28465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.188.98.43
Jul  7 22:34:01 ip-172-31-1-72 sshd[28465]: Failed password for invalid user vc from 222.188.98.43 port 19605 ssh2
Jul  7 22:36:22 ip-172-31-1-72 sshd[28499]: Invalid user vvv from 222.188.98.43
Jul  7 22:36:22 ip-172-31-1-72 sshd[28499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.188.98.43

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=222.188.98.43
2019-07-09 15:55:33
77.40.62.136 attackbots
Multiple SMTP connections
2019-07-09 16:09:37
177.44.17.242 attack
Jul  8 22:24:38 mailman postfix/smtpd[32663]: warning: unknown[177.44.17.242]: SASL PLAIN authentication failed: authentication failure
2019-07-09 16:38:58
106.13.119.163 attack
Jul  9 05:25:06 lnxmail61 sshd[12886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.119.163
Jul  9 05:25:08 lnxmail61 sshd[12886]: Failed password for invalid user idc from 106.13.119.163 port 55442 ssh2
Jul  9 05:26:35 lnxmail61 sshd[12998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.119.163
2019-07-09 15:57:10
202.137.134.166 attackspam
Automatic report - Web App Attack
2019-07-09 15:54:14
47.105.102.15 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-09 16:13:00
66.249.66.84 attack
Automatic report - Web App Attack
2019-07-09 16:44:19
177.124.89.14 attackspambots
v+ssh-bruteforce
2019-07-09 16:07:20
220.225.97.117 attackbotsspam
Trying ports that it shouldn't be.
2019-07-09 16:03:22
104.153.251.139 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-09 16:09:02
185.234.219.17 attackspam
Automatic report - Web App Attack
2019-07-09 16:03:00

Recently Reported IPs

62.147.14.99 214.236.73.39 217.105.249.219 198.156.150.132
22.239.243.105 209.125.92.2 30.96.251.234 76.243.190.168
4.215.237.70 147.28.43.30 226.29.132.208 236.76.84.195
29.129.222.181 35.182.36.61 165.166.161.142 83.57.253.26
62.118.231.170 222.243.11.35 194.43.236.218 90.66.24.229