Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wolgast

Region: Mecklenburg-Vorpommern

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '85.199.87.0 - 85.199.87.255'

% Abuse contact for '85.199.87.0 - 85.199.87.255' is 'abuse@ediscom.net'

inetnum:        85.199.87.0 - 85.199.87.255
netname:        ATL-NET
country:        DE
admin-c:        EC2540-RIPE
tech-c:         EC2540-RIPE
status:         ASSIGNED PA
mnt-by:         AS12693-MNT
created:        2024-12-11T09:17:58Z
last-modified:  2024-12-11T09:17:58Z
source:         RIPE # Filtered

role:           ediscom Hostmaster
address:        e.discom
address:        Telekommunikation GmbH
address:        Am Kanal 4a
address:        D-14467 Potsdam
address:        Germany
phone:          +49 331 9080 2000
fax-no:         +49 331 9080 4000
abuse-mailbox:  abuse@ediscom.net
remarks:        trouble: call +49 331 9080 3000
admin-c:        EZ1433-RIPE
tech-c:         EO988-RIPE
tech-c:         TD3134-RIPE
tech-c:         KS6258-RIPE
tech-c:         EZ1433-RIPE
tech-c:         DT7444-RIPE
tech-c:         AW6688-RIPE
nic-hdl:        EC2540-RIPE
mnt-by:         AS12693-MNT
created:        2002-07-03T08:33:19Z
last-modified:  2020-04-21T13:57:28Z
source:         RIPE # Filtered

% Information related to '85.199.64.0/18AS12693'

route:          85.199.64.0/18
descr:          e.discom PA space
descr:          3. Network
origin:         AS12693
mnt-by:         AS12693-MNT
created:        2005-03-23T07:23:47Z
last-modified:  2005-03-23T07:23:47Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122.1 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.199.87.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7098
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.199.87.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051600 1800 900 604800 86400

;; Query time: 148 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 17 01:05:21 CST 2026
;; MSG SIZE  rcvd: 106
Host info
142.87.199.85.in-addr.arpa domain name pointer 142.87.199.85.ediscom.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.87.199.85.in-addr.arpa	name = 142.87.199.85.ediscom.de.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
1.60.247.5 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-22 01:22:14
180.71.58.82 attackspam
Sep 21 13:04:33 XXXXXX sshd[3460]: Invalid user taskctl from 180.71.58.82 port 36365
2020-09-22 01:25:01
80.24.149.228 attack
$f2bV_matches
2020-09-22 01:20:12
188.166.16.36 attack
Sep 21 09:31:14 ns382633 sshd\[1967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.16.36  user=root
Sep 21 09:31:16 ns382633 sshd\[1967\]: Failed password for root from 188.166.16.36 port 57916 ssh2
Sep 21 09:38:58 ns382633 sshd\[3252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.16.36  user=root
Sep 21 09:39:00 ns382633 sshd\[3252\]: Failed password for root from 188.166.16.36 port 61856 ssh2
Sep 21 09:45:53 ns382633 sshd\[4801\]: Invalid user test from 188.166.16.36 port 22812
Sep 21 09:45:53 ns382633 sshd\[4801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.16.36
2020-09-22 01:32:07
156.54.164.97 attack
fail2ban -- 156.54.164.97
...
2020-09-22 01:41:24
87.251.75.8 attackbotsspam
RDP Bruteforce
2020-09-22 01:13:35
218.55.177.7 attack
Sep 21 11:43:31 server sshd[22728]: Failed password for root from 218.55.177.7 port 26515 ssh2
Sep 21 11:47:49 server sshd[23637]: Failed password for root from 218.55.177.7 port 53700 ssh2
Sep 21 11:52:07 server sshd[24608]: Failed password for root from 218.55.177.7 port 14599 ssh2
2020-09-22 01:36:25
133.242.155.85 attack
2020-09-21T11:59:54.6207151495-001 sshd[33646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.fm-net.ne.jp  user=root
2020-09-21T11:59:57.0634221495-001 sshd[33646]: Failed password for root from 133.242.155.85 port 43270 ssh2
2020-09-21T12:01:42.1757521495-001 sshd[33802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.fm-net.ne.jp  user=root
2020-09-21T12:01:44.7790381495-001 sshd[33802]: Failed password for root from 133.242.155.85 port 43946 ssh2
2020-09-21T12:03:31.1286701495-001 sshd[33894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.fm-net.ne.jp  user=root
2020-09-21T12:03:33.0294971495-001 sshd[33894]: Failed password for root from 133.242.155.85 port 44632 ssh2
...
2020-09-22 01:27:52
61.7.240.185 attack
Time:     Mon Sep 21 19:31:17 2020 +0200
IP:       61.7.240.185 (TH/Thailand/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 21 19:21:28 3-1 sshd[55148]: Invalid user ftpadmin from 61.7.240.185 port 57446
Sep 21 19:21:30 3-1 sshd[55148]: Failed password for invalid user ftpadmin from 61.7.240.185 port 57446 ssh2
Sep 21 19:26:48 3-1 sshd[55407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.240.185  user=root
Sep 21 19:26:50 3-1 sshd[55407]: Failed password for root from 61.7.240.185 port 49486 ssh2
Sep 21 19:31:14 3-1 sshd[55707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.240.185  user=root
2020-09-22 01:38:00
45.141.87.39 attack
Icarus honeypot on github
2020-09-22 01:15:18
103.16.228.135 attack
RDP Bruteforce
2020-09-22 01:12:15
119.45.54.166 attackbots
Automatic report - Banned IP Access
2020-09-22 01:18:19
46.41.138.43 attack
(sshd) Failed SSH login from 46.41.138.43 (PL/Poland/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 21 13:08:23 server sshd[30988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.41.138.43  user=root
Sep 21 13:08:25 server sshd[30988]: Failed password for root from 46.41.138.43 port 49592 ssh2
Sep 21 13:18:40 server sshd[2048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.41.138.43  user=root
Sep 21 13:18:42 server sshd[2048]: Failed password for root from 46.41.138.43 port 43666 ssh2
Sep 21 13:23:03 server sshd[3660]: Invalid user vboxuser from 46.41.138.43 port 49070
2020-09-22 01:37:31
3.6.92.83 attackbotsspam
Sep 21 01:55:06 *hidden* sshd[47271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.6.92.83 user=root Sep 21 01:55:08 *hidden* sshd[47271]: Failed password for *hidden* from 3.6.92.83 port 49540 ssh2 Sep 21 02:00:04 *hidden* sshd[47974]: Invalid user oracle2 from 3.6.92.83 port 33144
2020-09-22 01:20:35
106.52.12.21 attackspambots
Sep 21 16:14:33 ovpn sshd\[21360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.12.21  user=root
Sep 21 16:14:35 ovpn sshd\[21360\]: Failed password for root from 106.52.12.21 port 47440 ssh2
Sep 21 16:22:54 ovpn sshd\[14488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.12.21  user=root
Sep 21 16:22:55 ovpn sshd\[14488\]: Failed password for root from 106.52.12.21 port 38568 ssh2
Sep 21 16:25:14 ovpn sshd\[16084\]: Invalid user steam from 106.52.12.21
Sep 21 16:25:14 ovpn sshd\[16084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.12.21
2020-09-22 01:47:42

Recently Reported IPs

150.66.91.8 103.99.196.1 219.165.30.217 103.183.113.57
43.134.111.142 135.237.127.68 2606:4700:10::6814:8126 2606:4700:10::6816:1685
2606:4700:10::6816:3518 50.110.126.89 152.10.43.187 121.95.149.95
2606:4700:10::6816:593 111.252.120.5 10.30.121.238 213.209.159.186
178.238.224.28 35.201.217.81 38.12.35.206 2606:4700:10::6814:5021