Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.214.145.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.214.145.212.			IN	A

;; AUTHORITY SECTION:
.			575	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091400 1800 900 604800 86400

;; Query time: 461 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 14 21:18:38 CST 2022
;; MSG SIZE  rcvd: 107
Host info
212.145.214.85.in-addr.arpa domain name pointer h2842204.stratoserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.145.214.85.in-addr.arpa	name = h2842204.stratoserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.16.238.45 attack
23/tcp
[2019-07-03]1pkt
2019-07-03 20:24:57
169.89.89.2 attackspambots
445/tcp
[2019-07-03]1pkt
2019-07-03 20:15:06
110.138.149.196 attackbotsspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-03 05:40:42]
2019-07-03 20:56:20
5.196.237.238 attackbots
Jul  3 10:43:31 ns37 sshd[32688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.237.238
2019-07-03 20:39:16
46.176.107.187 attackbotsspam
Telnet Server BruteForce Attack
2019-07-03 20:38:10
122.121.192.125 attackbots
37215/tcp
[2019-07-03]1pkt
2019-07-03 20:43:03
41.222.70.178 attackbots
445/tcp
[2019-07-03]1pkt
2019-07-03 20:16:30
172.245.56.247 attack
Jul  3 05:33:07 server sshd\[12666\]: Invalid user kuang from 172.245.56.247
Jul  3 05:33:07 server sshd\[12666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.245.56.247
Jul  3 05:33:09 server sshd\[12666\]: Failed password for invalid user kuang from 172.245.56.247 port 56836 ssh2
...
2019-07-03 20:45:45
188.70.0.65 attackspambots
Trying to deliver email spam, but blocked by RBL
2019-07-03 20:15:36
202.22.226.52 attackspambots
5431/tcp
[2019-07-03]1pkt
2019-07-03 20:52:22
148.70.63.163 attackspambots
Jul  3 10:17:51 MainVPS sshd[9085]: Invalid user user from 148.70.63.163 port 47754
Jul  3 10:17:51 MainVPS sshd[9085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.63.163
Jul  3 10:17:51 MainVPS sshd[9085]: Invalid user user from 148.70.63.163 port 47754
Jul  3 10:17:52 MainVPS sshd[9085]: Failed password for invalid user user from 148.70.63.163 port 47754 ssh2
Jul  3 10:20:43 MainVPS sshd[9278]: Invalid user bnjoroge from 148.70.63.163 port 43328
...
2019-07-03 20:35:46
157.230.235.233 attack
Jul  3 13:28:16 server01 sshd\[5502\]: Invalid user vyatta from 157.230.235.233
Jul  3 13:28:16 server01 sshd\[5502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233
Jul  3 13:28:17 server01 sshd\[5502\]: Failed password for invalid user vyatta from 157.230.235.233 port 56674 ssh2
...
2019-07-03 20:23:49
83.103.193.224 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-03 20:53:17
36.89.209.22 attackspambots
Jul  3 13:00:05 jane sshd\[23306\]: Invalid user dominic from 36.89.209.22 port 59192
Jul  3 13:00:05 jane sshd\[23306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.209.22
Jul  3 13:00:07 jane sshd\[23306\]: Failed password for invalid user dominic from 36.89.209.22 port 59192 ssh2
...
2019-07-03 20:20:46
188.226.250.187 attackspam
Jul  3 14:49:41 dev sshd\[10113\]: Invalid user ts from 188.226.250.187 port 46832
Jul  3 14:49:41 dev sshd\[10113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.250.187
...
2019-07-03 20:57:43

Recently Reported IPs

194.233.67.153 38.44.74.120 72.26.48.253 34.85.217.27
20.14.97.71 20.234.38.204 13.233.138.127 2.116.133.73
139.28.36.142 36.112.136.105 89.238.212.68 164.92.189.209
64.42.179.67 187.195.218.248 58.33.168.75 165.232.140.207
73.29.29.202 137.184.225.81 14.177.27.153 85.208.86.148