Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dortmund

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.22.130.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50397
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.22.130.73.			IN	A

;; AUTHORITY SECTION:
.			2760	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090902 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 10 02:25:31 CST 2019
;; MSG SIZE  rcvd: 116
Host info
73.130.22.85.in-addr.arpa domain name pointer 85-22-130-73.ip.dokom21.de.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
73.130.22.85.in-addr.arpa	name = 85-22-130-73.ip.dokom21.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
196.189.91.129 attack
Aug 11 08:29:34 root sshd[17718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.189.91.129  user=root
Aug 11 08:29:36 root sshd[17718]: Failed password for root from 196.189.91.129 port 42440 ssh2
...
2020-08-11 18:00:29
218.28.238.162 attackspambots
Aug  8 06:01:23 Ubuntu-1404-trusty-64-minimal sshd\[3976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.238.162  user=root
Aug  8 06:01:24 Ubuntu-1404-trusty-64-minimal sshd\[3976\]: Failed password for root from 218.28.238.162 port 16602 ssh2
Aug  8 06:19:36 Ubuntu-1404-trusty-64-minimal sshd\[11893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.238.162  user=root
Aug  8 06:19:39 Ubuntu-1404-trusty-64-minimal sshd\[11893\]: Failed password for root from 218.28.238.162 port 58242 ssh2
Aug  8 06:24:13 Ubuntu-1404-trusty-64-minimal sshd\[14770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.238.162  user=root
2020-08-11 18:06:57
222.186.190.2 attackspambots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-11 18:09:48
222.186.175.183 attack
Aug 11 10:45:03 ajax sshd[30791]: Failed password for root from 222.186.175.183 port 44988 ssh2
Aug 11 10:45:08 ajax sshd[30791]: Failed password for root from 222.186.175.183 port 44988 ssh2
2020-08-11 17:49:54
45.55.156.19 attackspam
Brute-force attempt banned
2020-08-11 17:46:47
52.80.107.207 attackbotsspam
Aug 11 05:50:01 h2829583 sshd[13199]: Failed password for root from 52.80.107.207 port 52568 ssh2
2020-08-11 18:02:00
222.186.173.238 attack
Aug 11 11:48:00 sso sshd[11569]: Failed password for root from 222.186.173.238 port 47248 ssh2
Aug 11 11:48:10 sso sshd[11569]: Failed password for root from 222.186.173.238 port 47248 ssh2
...
2020-08-11 17:50:20
89.248.162.247 attack
[H1.VM8] Blocked by UFW
2020-08-11 17:48:20
111.75.208.138 attackspam
firewall-block, port(s): 445/tcp
2020-08-11 17:59:09
181.48.18.130 attackbots
Aug  9 11:06:50 Ubuntu-1404-trusty-64-minimal sshd\[16169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.18.130  user=root
Aug  9 11:06:52 Ubuntu-1404-trusty-64-minimal sshd\[16169\]: Failed password for root from 181.48.18.130 port 50086 ssh2
Aug  9 11:19:55 Ubuntu-1404-trusty-64-minimal sshd\[23520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.18.130  user=root
Aug  9 11:19:57 Ubuntu-1404-trusty-64-minimal sshd\[23520\]: Failed password for root from 181.48.18.130 port 44392 ssh2
Aug  9 11:24:33 Ubuntu-1404-trusty-64-minimal sshd\[26334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.18.130  user=root
2020-08-11 17:37:45
194.180.224.130 attack
Aug  8 03:21:55 Ubuntu-1404-trusty-64-minimal sshd\[8772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.130  user=root
Aug  8 03:21:57 Ubuntu-1404-trusty-64-minimal sshd\[8772\]: Failed password for root from 194.180.224.130 port 41778 ssh2
Aug  8 04:23:32 Ubuntu-1404-trusty-64-minimal sshd\[14089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.130  user=root
Aug  8 04:23:34 Ubuntu-1404-trusty-64-minimal sshd\[14089\]: Failed password for root from 194.180.224.130 port 53468 ssh2
Aug  8 08:33:33 Ubuntu-1404-trusty-64-minimal sshd\[28706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.130  user=root
2020-08-11 17:33:52
106.13.98.132 attackspambots
k+ssh-bruteforce
2020-08-11 18:07:16
180.76.111.214 attack
firewall-block, port(s): 22364/tcp
2020-08-11 17:44:32
218.250.113.91 attackbots
Aug 11 04:26:58 host-itldc-nl sshd[68930]: User root from 218.250.113.91 not allowed because not listed in AllowUsers
Aug 11 05:50:12 host-itldc-nl sshd[1957]: Invalid user pi from 218.250.113.91 port 35292
Aug 11 05:50:23 host-itldc-nl sshd[4317]: User root from 218.250.113.91 not allowed because not listed in AllowUsers
...
2020-08-11 17:39:32
13.70.199.80 attackbotsspam
Attempted WordPress login: "GET /wp-login.php"
2020-08-11 18:04:02

Recently Reported IPs

78.3.211.4 92.39.237.232 82.191.167.255 111.84.23.86
88.208.128.226 102.164.194.92 217.63.205.157 195.224.138.61
225.244.70.247 206.126.228.88 71.156.145.93 68.52.131.139
183.109.88.165 154.92.211.129 138.68.208.97 169.85.130.174
100.234.132.193 118.70.129.221 86.188.55.208 62.138.14.137