Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gravelines

Region: Hauts-de-France

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '85.217.140.0 - 85.217.140.255'

% Abuse contact for '85.217.140.0 - 85.217.140.255' is 'abuse@modat.io'

inetnum:        85.217.140.0 - 85.217.140.255
geoloc:         48.8582  2.3387
netname:        NL-MODAT-20050118
country:        FR
org:            ORG-MB333-RIPE
admin-c:        SA44188-RIPE
tech-c:         SA44188-RIPE
status:         ALLOCATED PA
mnt-by:         lir-nl-modat-1-MNT
mnt-by:         RIPE-NCC-HM-MNT
created:        2025-10-01T10:50:59Z
last-modified:  2026-01-05T14:34:51Z
source:         RIPE
descr:          -----BEGIN TOKEN-----0583cd002dd2d40e0493d0b39614036b09af1496be82f0ea11044c6a4f69570044d6239017a1a02777ac81b2b9fb53ace406737ea8afd965b98f4332ad67b88d-----END TOKEN-----

organisation:   ORG-MB333-RIPE
org-name:       Modat B.V.
country:        NL
org-type:       LIR
address:        Wilhelmina van Pruisenweg 104
address:        2595 AN
address:        Den Haag
address:        NETHERLANDS
phone:          +31625014423
admin-c:        SA44188-RIPE
tech-c:         SA44188-RIPE
abuse-c:        AR78809-RIPE
mnt-ref:        lir-nl-modat-1-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         lir-nl-modat-1-MNT
created:        2025-09-16T07:00:41Z
last-modified:  2025-09-16T07:00:41Z
source:         RIPE # Filtered

role:           security
address:        NETHERLANDS
address:        Den Haag
address:        2595 AN
address:        Wilhelmina van Pruisenweg 104
phone:          +31625014423
nic-hdl:        SA44188-RIPE
mnt-by:         lir-nl-modat-1-MNT
created:        2025-09-16T07:00:41Z
last-modified:  2025-09-16T07:00:41Z
source:         RIPE # Filtered

% Information related to '85.217.140.0/24AS209334'

route:          85.217.140.0/24
origin:         AS209334
mnt-by:         lir-nl-modat-1-MNT
created:        2025-10-10T08:43:52Z
last-modified:  2025-10-10T08:43:52Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.120 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.217.140.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41502
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.217.140.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020401 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 05 10:00:23 CST 2026
;; MSG SIZE  rcvd: 105
Host info
8.140.217.85.in-addr.arpa domain name pointer o308.scanner.modat.io.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.140.217.85.in-addr.arpa	name = o308.scanner.modat.io.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.67.107.8 attackbots
Unauthorized connection attempt from IP address 94.67.107.8 on Port 445(SMB)
2019-12-19 05:46:10
40.92.75.83 attack
Dec 18 18:49:55 debian-2gb-vpn-nbg1-1 kernel: [1062559.827544] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.75.83 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=36697 DF PROTO=TCP SPT=10587 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-19 05:21:16
89.248.167.133 attack
CloudCIX Reconnaissance Scan Detected, PTR: no-reverse-dns-configured.com.
2019-12-19 05:44:11
140.213.20.14 attack
Email address rejected
2019-12-19 05:18:07
211.72.164.185 attackspam
Unauthorized connection attempt from IP address 211.72.164.185 on Port 445(SMB)
2019-12-19 05:05:59
84.54.58.143 spamattack
singing in on my stuff is a no no bud
2019-12-19 05:15:02
77.20.107.79 attackbotsspam
$f2bV_matches
2019-12-19 05:42:16
79.110.192.122 attackbots
Dec 18 20:04:42 work-partkepr sshd\[18060\]: Invalid user mall from 79.110.192.122 port 34694
Dec 18 20:04:42 work-partkepr sshd\[18060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.110.192.122
...
2019-12-19 05:22:03
177.205.20.198 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-12-19 05:21:32
219.91.222.148 attackspambots
[ssh] SSH attack
2019-12-19 05:23:16
51.75.248.127 attack
SSH brute-force: detected 8 distinct usernames within a 24-hour window.
2019-12-19 05:31:26
103.113.64.6 attackbots
Unauthorized connection attempt detected from IP address 103.113.64.6 to port 445
2019-12-19 05:27:10
84.54.58.143 spamattack
singing in on my stuff is a no no bud
2019-12-19 05:14:51
84.22.40.25 attackspam
Unauthorized connection attempt from IP address 84.22.40.25 on Port 445(SMB)
2019-12-19 05:29:08
212.71.251.228 attackspambots
Dec 18 15:24:30 lvps92-51-164-246 sshd[21267]: Failed password for invalid user r.r from 212.71.251.228 port 39930 ssh2
Dec 18 15:24:30 lvps92-51-164-246 sshd[21267]: Received disconnect from 212.71.251.228: 11: Bye Bye [preauth]
Dec 18 15:32:04 lvps92-51-164-246 sshd[21291]: Invalid user sensivhostnamey from 212.71.251.228


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=212.71.251.228
2019-12-19 05:07:20

Recently Reported IPs

175.178.184.98 54.152.127.68 13.251.230.154 74.7.242.166
192.121.134.92 141.138.208.43 185.247.137.96 185.12.59.117
91.231.89.179 184.73.67.32 92.71.108.103 176.65.148.201
14.213.12.24 128.203.200.216 205.201.0.54 104.206.110.189
85.217.140.7 183.222.72.214 145.97.127.217 217.217.250.193