Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dortmund

Region: Nordrhein-Westfalen

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.22.2.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 241
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.22.2.74.			IN	A

;; AUTHORITY SECTION:
.			302	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092100 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 21 17:15:35 CST 2022
;; MSG SIZE  rcvd: 103
Host info
74.2.22.85.in-addr.arpa domain name pointer 85-22-2-74.ip.dokom21.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
74.2.22.85.in-addr.arpa	name = 85-22-2-74.ip.dokom21.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.75.27.206 attackspam
Icarus honeypot on github
2020-02-25 05:19:19
1.34.117.251 attack
Feb 24 20:18:37 XXX sshd[36396]: Invalid user structuuropmaat from 1.34.117.251 port 36172
2020-02-25 05:20:06
62.98.57.183 attack
Automatic report - Port Scan Attack
2020-02-25 05:14:00
82.209.218.171 attack
Trying ports that it shouldn't be.
2020-02-25 04:58:20
138.186.39.94 attackspambots
24.02.2020 14:21:02 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2020-02-25 04:51:30
185.53.88.121 attackbotsspam
suspicious action Mon, 24 Feb 2020 16:45:58 -0300
2020-02-25 04:50:38
222.186.15.158 attackbotsspam
Feb 24 22:17:10 server sshd[465573]: Failed password for root from 222.186.15.158 port 58099 ssh2
Feb 24 22:17:15 server sshd[465573]: Failed password for root from 222.186.15.158 port 58099 ssh2
Feb 24 22:17:17 server sshd[465573]: Failed password for root from 222.186.15.158 port 58099 ssh2
2020-02-25 05:18:03
82.223.16.182 attackbots
Invalid user ftpuser from 82.223.16.182 port 55910
2020-02-25 04:56:43
182.16.249.130 attack
Invalid user ftpuser from 182.16.249.130 port 22057
2020-02-25 04:55:17
59.92.225.138 attack
20/2/24@09:11:58: FAIL: Alarm-Network address from=59.92.225.138
...
2020-02-25 04:49:38
117.68.171.96 attack
RDP Scan
2020-02-25 04:58:45
193.32.161.60 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2020-02-25 05:20:31
42.200.116.184 attack
Unauthorized connection attempt detected from IP address 42.200.116.184 to port 445
2020-02-25 04:59:17
113.172.97.226 attackbots
"SMTP brute force auth login attempt."
2020-02-25 05:13:43
88.249.2.97 attackspambots
Automatic report - Banned IP Access
2020-02-25 04:54:15

Recently Reported IPs

37.165.193.200 98.210.214.158 155.167.53.182 46.222.199.199
161.89.90.85 191.119.88.197 41.218.199.135 213.68.62.30
4.214.247.5 192.34.98.169 55.130.162.186 178.128.161.176
178.128.161.213 178.128.161.112 75.95.138.221 67.240.69.167
8.196.138.178 35.35.97.166 186.11.39.33 183.61.185.111