Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: Telenor Sverige AB

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Scanned 3 times in the last 24 hours on port 22
2020-09-03 22:22:51
attackbotsspam
Scanned 3 times in the last 24 hours on port 22
2020-09-03 14:04:05
attack
Sep  2 20:53:38 jane sshd[21473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.228.105.207 
Sep  2 20:53:39 jane sshd[21473]: Failed password for invalid user pi from 85.228.105.207 port 43770 ssh2
...
2020-09-03 06:17:03
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.228.105.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43737
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.228.105.207.			IN	A

;; AUTHORITY SECTION:
.			427	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090202 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 03 06:17:00 CST 2020
;; MSG SIZE  rcvd: 118
Host info
207.105.228.85.in-addr.arpa domain name pointer ua-85-228-105-207.bbcust.telenor.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.105.228.85.in-addr.arpa	name = ua-85-228-105-207.bbcust.telenor.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
23.124.47.4 attackbots
tcp 81
2020-02-29 03:49:13
119.42.125.124 attackspam
1582896425 - 02/28/2020 14:27:05 Host: 119.42.125.124/119.42.125.124 Port: 445 TCP Blocked
2020-02-29 03:55:55
178.128.236.202 attack
ENG,WP GET /wp-login.php
2020-02-29 03:44:56
42.112.202.156 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 03:34:51
5.157.96.66 attackbotsspam
(imapd) Failed IMAP login from 5.157.96.66 (IT/Italy/5-157-96-66.v4.ngi.it): 1 in the last 3600 secs
2020-02-29 03:38:45
118.35.67.235 attackspam
scan z
2020-02-29 03:26:08
118.193.31.181 attackbotsspam
scan r
2020-02-29 03:54:24
36.74.75.31 attack
(sshd) Failed SSH login from 36.74.75.31 (ID/Indonesia/-): 5 in the last 3600 secs
2020-02-29 03:35:16
42.112.136.91 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 03:39:10
87.122.111.254 attack
Brute-force attempt banned
2020-02-29 03:48:09
71.6.232.4 attackbotsspam
Fail2Ban Ban Triggered
2020-02-29 03:37:26
42.112.147.87 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 03:37:50
12.216.242.118 attackspam
Unauthorized connection attempt detected from IP address 12.216.242.118 to port 445
2020-02-29 03:42:59
51.68.189.69 attackbotsspam
(sshd) Failed SSH login from 51.68.189.69 (DE/Germany/69.ip-51-68-189.eu): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 28 14:27:43 ubnt-55d23 sshd[11583]: Invalid user minecraft from 51.68.189.69 port 34311
Feb 28 14:27:46 ubnt-55d23 sshd[11583]: Failed password for invalid user minecraft from 51.68.189.69 port 34311 ssh2
2020-02-29 03:24:14
171.13.19.171 attackspam
[portscan] Port scan
2020-02-29 03:39:39

Recently Reported IPs

152.88.116.241 168.41.199.99 176.42.152.166 112.119.33.185
112.118.218.71 185.229.205.213 125.117.168.238 72.53.96.22
45.80.90.44 116.206.59.195 73.74.177.206 151.18.193.98
44.129.175.17 211.29.197.42 31.43.99.249 190.252.101.118
39.238.188.97 83.126.92.17 162.4.139.11 62.173.149.222