Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.22.99.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.22.99.98.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121001 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 01:50:31 CST 2024
;; MSG SIZE  rcvd: 104
Host info
98.99.22.85.in-addr.arpa domain name pointer 85-22-99-98.ip.dokom21.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
98.99.22.85.in-addr.arpa	name = 85-22-99-98.ip.dokom21.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.129.33.51 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 54016 proto: tcp cat: Misc Attackbytes: 60
2020-09-19 21:42:11
201.123.173.205 attackspambots
Brute-force attempt banned
2020-09-19 21:10:18
189.91.232.215 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-19 21:21:01
200.60.11.195 attack
Unauthorized connection attempt from IP address 200.60.11.195 on Port 445(SMB)
2020-09-19 21:10:32
87.251.74.201 attackbotsspam
Port scan on 3 port(s): 1963 1976 2009
2020-09-19 21:13:44
104.41.131.135 attackbotsspam
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=53323  .  dstport=5061  .     (2874)
2020-09-19 21:28:00
5.29.145.86 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-19 21:46:23
92.222.79.157 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-19 21:37:35
190.57.133.114 attackbots
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=16914  .  dstport=80  .     (2872)
2020-09-19 21:49:11
27.154.67.176 attackspam
2020-09-19T08:09:43.8859711495-001 sshd[10606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.154.67.176
2020-09-19T08:09:43.8821051495-001 sshd[10606]: Invalid user test from 27.154.67.176 port 36448
2020-09-19T08:09:45.5535191495-001 sshd[10606]: Failed password for invalid user test from 27.154.67.176 port 36448 ssh2
2020-09-19T08:15:03.8118851495-001 sshd[10778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.154.67.176  user=root
2020-09-19T08:15:06.4123361495-001 sshd[10778]: Failed password for root from 27.154.67.176 port 43450 ssh2
2020-09-19T08:20:20.9491531495-001 sshd[11070]: Invalid user www from 27.154.67.176 port 50436
...
2020-09-19 21:23:13
81.17.154.118 attack
Unauthorized connection attempt from IP address 81.17.154.118 on Port 445(SMB)
2020-09-19 21:09:47
14.235.203.122 attack
Unauthorized connection attempt from IP address 14.235.203.122 on Port 445(SMB)
2020-09-19 21:30:37
210.2.134.34 attackbots
Unauthorized connection attempt from IP address 210.2.134.34 on Port 445(SMB)
2020-09-19 21:41:02
222.186.31.83 attack
Sep 19 15:24:18 vps639187 sshd\[22853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Sep 19 15:24:20 vps639187 sshd\[22853\]: Failed password for root from 222.186.31.83 port 28561 ssh2
Sep 19 15:24:23 vps639187 sshd\[22853\]: Failed password for root from 222.186.31.83 port 28561 ssh2
...
2020-09-19 21:26:20
42.2.101.166 attackspambots
Sep 19 08:02:47 vps639187 sshd\[14217\]: Invalid user guest from 42.2.101.166 port 35406
Sep 19 08:02:47 vps639187 sshd\[14217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.2.101.166
Sep 19 08:02:49 vps639187 sshd\[14217\]: Failed password for invalid user guest from 42.2.101.166 port 35406 ssh2
...
2020-09-19 21:50:41

Recently Reported IPs

94.154.121.137 45.104.170.26 171.153.136.1 204.25.55.68
57.80.218.183 63.59.105.110 193.101.27.67 132.38.63.203
186.35.161.246 195.3.86.147 122.121.137.204 166.197.129.230
98.61.51.235 214.0.15.188 250.38.186.226 71.155.122.109
171.213.194.10 187.71.216.22 136.27.56.120 126.245.202.138