Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Iserlohn

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.22.158.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.22.158.198.			IN	A

;; AUTHORITY SECTION:
.			563	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081401 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 15 08:51:37 CST 2020
;; MSG SIZE  rcvd: 117
Host info
198.158.22.85.in-addr.arpa domain name pointer earth.okit.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
198.158.22.85.in-addr.arpa	name = earth.okit.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.34 attackbots
firewall-block, port(s): 8020/tcp
2019-11-30 04:29:48
45.93.20.180 attackspam
Fail2Ban Ban Triggered
2019-11-30 04:01:20
106.12.86.205 attackbots
Nov 29 19:58:17 mail sshd\[5127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.205  user=root
Nov 29 19:58:19 mail sshd\[5127\]: Failed password for root from 106.12.86.205 port 55928 ssh2
Nov 29 20:02:12 mail sshd\[5441\]: Invalid user achaer74 from 106.12.86.205
Nov 29 20:02:12 mail sshd\[5441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.205
...
2019-11-30 04:30:48
159.203.201.219 attackspam
32255/tcp 49274/tcp 50116/tcp...
[2019-09-29/11-29]62pkt,47pt.(tcp),6pt.(udp)
2019-11-30 04:19:17
154.8.233.189 attackbotsspam
Nov 29 16:34:39 OPSO sshd\[28832\]: Invalid user wwwrun from 154.8.233.189 port 41224
Nov 29 16:34:39 OPSO sshd\[28832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.189
Nov 29 16:34:40 OPSO sshd\[28832\]: Failed password for invalid user wwwrun from 154.8.233.189 port 41224 ssh2
Nov 29 16:40:03 OPSO sshd\[29907\]: Invalid user ssh from 154.8.233.189 port 47180
Nov 29 16:40:03 OPSO sshd\[29907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.189
2019-11-30 04:13:45
157.230.119.200 attackbotsspam
2019-09-17T00:41:43.464760suse-nuc sshd[6213]: Invalid user legal1 from 157.230.119.200 port 42120
...
2019-11-30 04:11:51
72.48.214.68 attackbots
Nov 29 21:38:26 microserver sshd[28655]: Invalid user php from 72.48.214.68 port 52284
Nov 29 21:38:26 microserver sshd[28655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 29 21:38:28 microserver sshd[28655]: Failed password for invalid user php from 72.48.214.68 port 52284 ssh2
Nov 29 21:38:38 microserver sshd[28689]: Invalid user usuario from 72.48.214.68 port 52652
Nov 29 21:38:38 microserver sshd[28689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 29 22:04:42 microserver sshd[32999]: Invalid user dennis from 72.48.214.68 port 35318
Nov 29 22:04:42 microserver sshd[32999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 29 22:04:44 microserver sshd[32999]: Failed password for invalid user dennis from 72.48.214.68 port 35318 ssh2
Nov 29 22:04:52 microserver sshd[33010]: Invalid user tao from 72.48.214.68 port 35718
Nov 29 22:04:52
2019-11-30 04:13:13
139.59.153.133 attackspam
Automatic report - Banned IP Access
2019-11-30 04:26:27
92.118.161.4 attackbots
SSH login attempts with user root.
2019-11-30 04:36:25
139.159.217.217 attack
11/29/2019-14:46:29.721872 139.159.217.217 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-30 04:04:59
190.153.249.99 attack
Nov 29 13:02:06 Tower sshd[13406]: Connection from 190.153.249.99 port 35145 on 192.168.10.220 port 22
Nov 29 13:02:07 Tower sshd[13406]: Invalid user gmoney from 190.153.249.99 port 35145
Nov 29 13:02:07 Tower sshd[13406]: error: Could not get shadow information for NOUSER
Nov 29 13:02:07 Tower sshd[13406]: Failed password for invalid user gmoney from 190.153.249.99 port 35145 ssh2
Nov 29 13:02:08 Tower sshd[13406]: Received disconnect from 190.153.249.99 port 35145:11: Bye Bye [preauth]
Nov 29 13:02:08 Tower sshd[13406]: Disconnected from invalid user gmoney 190.153.249.99 port 35145 [preauth]
2019-11-30 04:06:17
94.180.9.2 attackbots
SSH login attempts with user root.
2019-11-30 04:34:06
41.203.156.254 attackspambots
Nov 29 12:48:51 plusreed sshd[20676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.203.156.254  user=root
Nov 29 12:48:53 plusreed sshd[20676]: Failed password for root from 41.203.156.254 port 54580 ssh2
...
2019-11-30 04:14:49
203.76.248.49 attackbots
Unauthorised access (Nov 29) SRC=203.76.248.49 LEN=52 TTL=118 ID=27330 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 29) SRC=203.76.248.49 LEN=52 TTL=116 ID=29918 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 04:16:13
45.232.73.100 attackspam
Nov 29 16:08:09 vps691689 sshd[31997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.73.100
Nov 29 16:08:09 vps691689 sshd[31998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.73.100
...
2019-11-30 03:59:36

Recently Reported IPs

185.130.45.60 109.39.209.239 81.107.153.86 66.41.47.170
54.167.86.155 12.192.147.204 82.135.23.155 76.116.218.249
199.116.226.17 117.154.95.228 86.4.161.201 95.50.217.198
106.246.21.17 111.168.168.191 87.51.181.21 54.235.18.77
170.83.189.97 64.184.131.65 101.150.191.121 173.225.11.69