Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berlin

Region: Berlin

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.214.41.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55087
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.214.41.219.			IN	A

;; AUTHORITY SECTION:
.			173	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023061600 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 16 22:58:04 CST 2023
;; MSG SIZE  rcvd: 106
Host info
219.41.214.85.in-addr.arpa domain name pointer h2917560.stratoserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.41.214.85.in-addr.arpa	name = h2917560.stratoserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.132.52.29 attackspam
Invalid user team from 61.132.52.29 port 43958
2020-10-01 14:09:15
35.237.167.241 attack
Bad Web Bot (ZoominfoBot).
2020-10-01 14:19:49
49.234.105.96 attackbotsspam
$f2bV_matches
2020-10-01 13:56:54
120.85.61.241 attackbotsspam
Oct  1 01:29:39 r.ca sshd[29171]: Failed password for invalid user www-data from 120.85.61.241 port 16672 ssh2
2020-10-01 14:12:48
199.195.254.38 attackbotsspam
Port scanning [4 denied]
2020-10-01 14:01:03
222.186.42.155 attack
2020-10-01T07:58:57.366021centos sshd[8950]: Failed password for root from 222.186.42.155 port 15685 ssh2
2020-10-01T07:59:01.104038centos sshd[8950]: Failed password for root from 222.186.42.155 port 15685 ssh2
2020-10-01T07:59:04.607037centos sshd[8950]: Failed password for root from 222.186.42.155 port 15685 ssh2
...
2020-10-01 14:00:19
50.68.200.101 attack
2020-10-01T01:08:29.495783dreamphreak.com sshd[504384]: Invalid user tmpuser from 50.68.200.101 port 49620
2020-10-01T01:08:31.293494dreamphreak.com sshd[504384]: Failed password for invalid user tmpuser from 50.68.200.101 port 49620 ssh2
...
2020-10-01 14:27:50
38.68.50.195 attack
Port scan: Attack repeated for 24 hours
2020-10-01 13:44:27
95.84.240.62 attackbotsspam
Invalid user usuario2 from 95.84.240.62 port 36560
2020-10-01 13:55:59
116.196.105.232 attack
Port scan denied
2020-10-01 14:18:50
142.93.235.47 attackspambots
Invalid user buero from 142.93.235.47 port 40720
2020-10-01 13:45:51
103.44.253.18 attackspam
Invalid user oracle from 103.44.253.18 port 51010
2020-10-01 14:01:59
34.105.101.247 attackbots
uvcm 34.105.101.247 [28/Sep/2020:18:35:37 "-" "POST /wp-login.php 200 6727
34.105.101.247 [28/Sep/2020:18:35:38 "-" "GET /wp-login.php 200 6619
34.105.101.247 [28/Sep/2020:18:35:40 "-" "POST /wp-login.php 200 6744
2020-10-01 14:20:11
106.13.45.212 attack
Oct  1 05:43:13 *** sshd[22577]: Invalid user phoenix from 106.13.45.212
2020-10-01 13:54:46
81.120.65.55 attack
20 attempts against mh-misbehave-ban on leaf
2020-10-01 14:06:04

Recently Reported IPs

146.70.126.75 90.253.26.8 135.79.26.189 49.252.166.205
185.68.253.157 146.197.87.27 107.120.4.249 107.170.236.19
198.235.24.99 102.181.94.197 150.125.36.176 167.65.107.46
44.44.41.107 215.112.253.114 151.112.253.233 140.250.253.151
33.152.47.82 64.234.121.243 123.16.1.116 14.243.10.159