Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berlin

Region: Land Berlin

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: Strato AG

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.214.234.186
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61897
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.214.234.186.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041502 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 16 11:24:29 +08 2019
;; MSG SIZE  rcvd: 118

Host info
186.234.214.85.in-addr.arpa domain name pointer h2114712.stratoserver.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
186.234.214.85.in-addr.arpa	name = h2114712.stratoserver.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
191.53.116.6 attackspam
Brute force attack stopped by firewall
2019-07-08 16:18:42
46.246.65.174 attackspam
46.246.65.174 - - [08/Jul/2019:10:28:22 +0200] "GET /adminer.php HTTP/1.1" 302 571
...
2019-07-08 16:53:04
3.81.230.125 attackspam
Jul  8 08:28:40   TCP Attack: SRC=3.81.230.125 DST=[Masked] LEN=250 TOS=0x00 PREC=0x00 TTL=234  DF PROTO=TCP SPT=40200 DPT=80 WINDOW=913 RES=0x00 ACK PSH URGP=0
2019-07-08 16:40:29
91.134.120.5 attackspambots
2019-07-08T08:46:30.602547abusebot-7.cloudsearch.cf sshd\[15993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.120.5.infinity-hosting.com  user=root
2019-07-08 16:47:16
187.87.7.222 attack
Brute force attack stopped by firewall
2019-07-08 16:24:12
121.146.105.73 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-08 16:25:53
170.244.212.110 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 16:46:57
191.53.251.226 attack
Brute force attack stopped by firewall
2019-07-08 16:16:23
113.177.134.201 attack
Automatic report - SSH Brute-Force Attack
2019-07-08 16:36:25
153.36.236.35 attackspam
Jul  8 08:46:54 localhost sshd\[92642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
Jul  8 08:46:56 localhost sshd\[92642\]: Failed password for root from 153.36.236.35 port 24679 ssh2
Jul  8 08:46:58 localhost sshd\[92642\]: Failed password for root from 153.36.236.35 port 24679 ssh2
Jul  8 08:47:01 localhost sshd\[92642\]: Failed password for root from 153.36.236.35 port 24679 ssh2
Jul  8 08:47:03 localhost sshd\[92646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
...
2019-07-08 16:58:18
191.240.36.210 attackspam
Brute force attack stopped by firewall
2019-07-08 16:22:29
177.23.59.130 attack
Brute force attack stopped by firewall
2019-07-08 16:20:48
181.143.183.44 attackspam
10 attempts against mh-pma-try-ban on seed.magehost.pro
2019-07-08 16:59:22
191.53.222.80 attackspam
Brute force attack stopped by firewall
2019-07-08 16:18:05
153.36.236.151 attackbotsspam
Jul  8 08:28:45 work-partkepr sshd\[8202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.151  user=root
Jul  8 08:28:48 work-partkepr sshd\[8202\]: Failed password for root from 153.36.236.151 port 15902 ssh2
...
2019-07-08 16:36:49

Recently Reported IPs

5.9.108.254 209.242.219.20 5.9.61.232 37.201.192.92
176.59.204.74 117.92.16.229 46.102.24.66 36.69.126.14
125.165.150.143 122.114.234.37 167.250.218.4 119.28.99.126
157.230.140.147 119.29.98.253 27.72.158.102 36.72.229.19
43.230.128.219 118.70.132.62 51.79.130.186 192.227.158.54