Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tallinn

Region: Harju County

Country: Estonia

Internet Service Provider: Elisa

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '85.253.208.0 - 85.253.211.255'

% Abuse contact for '85.253.208.0 - 85.253.211.255' is 'abuse@elisa.ee'

inetnum:        85.253.208.0 - 85.253.211.255
netname:        EE-ELISA-CLIENTS
descr:          Cable network clients
descr:          Static and dynamic addresses
country:        EE
admin-c:        EH1854-RIPE
tech-c:         EH1854-RIPE
status:         ASSIGNED PA
mnt-by:         ELISAEE-MNT
mnt-lower:      ELISAEE-MNT
mnt-routes:     ELISAEE-MNT
created:        2018-02-21T08:38:22Z
last-modified:  2026-03-16T10:36:07Z
source:         RIPE

role:           Elisa Hostmaster
address:        Elisa Eesti AS
address:        Sopruse pst. 145
address:        13417 Tallinn
address:        Estonia
admin-c:        MN334-RIPE
tech-c:         MN334-RIPE
tech-c:         RR13090-RIPE
admin-c:        RJ390-RIPE
nic-hdl:        EH1854-RIPE
mnt-by:         ELISAEE-MNT
abuse-mailbox:  abuse@elisa.ee
created:        2011-04-27T06:01:25Z
last-modified:  2026-03-17T09:31:34Z
source:         RIPE # Filtered

% Information related to '85.253.0.0/16AS2586'

route:          85.253.0.0/16
origin:         AS2586
mnt-by:         ELISAEE-MNT
created:        2021-04-15T22:08:02Z
last-modified:  2026-03-17T09:07:50Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.253.211.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64716
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.253.211.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032002 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 13:54:58 CST 2026
;; MSG SIZE  rcvd: 107
Host info
133.211.253.85.in-addr.arpa domain name pointer 85-253-211-133.ip.elisa.ee.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
133.211.253.85.in-addr.arpa	name = 85-253-211-133.ip.elisa.ee.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
150.95.140.160 attack
Nov 22 08:56:07 meumeu sshd[28028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.140.160 
Nov 22 08:56:09 meumeu sshd[28028]: Failed password for invalid user rikardsen from 150.95.140.160 port 57252 ssh2
Nov 22 09:00:07 meumeu sshd[28438]: Failed password for www-data from 150.95.140.160 port 36694 ssh2
...
2019-11-22 19:18:25
153.254.115.57 attackbotsspam
Nov 22 11:37:19 server sshd\[1126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.254.115.57  user=root
Nov 22 11:37:21 server sshd\[1126\]: Failed password for root from 153.254.115.57 port 15014 ssh2
Nov 22 11:46:56 server sshd\[3677\]: Invalid user castner from 153.254.115.57
Nov 22 11:46:56 server sshd\[3677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.254.115.57 
Nov 22 11:46:58 server sshd\[3677\]: Failed password for invalid user castner from 153.254.115.57 port 15189 ssh2
...
2019-11-22 18:55:28
190.67.116.12 attackbotsspam
Nov 22 10:33:13 MK-Soft-Root2 sshd[5830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.67.116.12 
Nov 22 10:33:15 MK-Soft-Root2 sshd[5830]: Failed password for invalid user abc from 190.67.116.12 port 53518 ssh2
...
2019-11-22 18:58:27
113.188.121.254 attack
445/tcp
[2019-11-22]1pkt
2019-11-22 19:26:14
218.92.0.190 attackspam
Nov 22 15:49:47 areeb-Workstation sshd[13343]: Failed password for root from 218.92.0.190 port 47512 ssh2
...
2019-11-22 19:28:32
190.0.159.86 attack
Nov 22 09:33:11 microserver sshd[51281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.86  user=uucp
Nov 22 09:33:14 microserver sshd[51281]: Failed password for uucp from 190.0.159.86 port 51623 ssh2
Nov 22 09:41:24 microserver sshd[52552]: Invalid user madalina from 190.0.159.86 port 41311
Nov 22 09:41:24 microserver sshd[52552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.86
Nov 22 09:41:25 microserver sshd[52552]: Failed password for invalid user madalina from 190.0.159.86 port 41311 ssh2
Nov 22 10:14:13 microserver sshd[56789]: Invalid user reneau from 190.0.159.86 port 56543
Nov 22 10:14:13 microserver sshd[56789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.86
Nov 22 10:14:15 microserver sshd[56789]: Failed password for invalid user reneau from 190.0.159.86 port 56543 ssh2
Nov 22 10:22:31 microserver sshd[58032]: Invalid user puhak from 190.0.15
2019-11-22 19:25:51
113.141.28.106 attackspam
SSH Bruteforce
2019-11-22 19:06:23
45.148.10.51 attack
Nov 22 09:36:53 diego postfix/smtpd\[16391\]: warning: unknown\[45.148.10.51\]: SASL LOGIN authentication failed: authentication failure
2019-11-22 19:12:49
117.55.241.2 attackbots
2019-11-22T09:44:13.153710abusebot-4.cloudsearch.cf sshd\[3505\]: Invalid user mysql from 117.55.241.2 port 33218
2019-11-22 19:00:24
129.211.77.44 attackspambots
Nov 21 22:04:20 hanapaa sshd\[12166\]: Invalid user test from 129.211.77.44
Nov 21 22:04:20 hanapaa sshd\[12166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.77.44
Nov 21 22:04:21 hanapaa sshd\[12166\]: Failed password for invalid user test from 129.211.77.44 port 38786 ssh2
Nov 21 22:08:54 hanapaa sshd\[12540\]: Invalid user rpc from 129.211.77.44
Nov 21 22:08:54 hanapaa sshd\[12540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.77.44
2019-11-22 19:04:21
153.3.232.177 attackspambots
Nov 22 14:56:39 vibhu-HP-Z238-Microtower-Workstation sshd\[14336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.3.232.177  user=root
Nov 22 14:56:41 vibhu-HP-Z238-Microtower-Workstation sshd\[14336\]: Failed password for root from 153.3.232.177 port 47498 ssh2
Nov 22 15:01:18 vibhu-HP-Z238-Microtower-Workstation sshd\[14522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.3.232.177  user=games
Nov 22 15:01:20 vibhu-HP-Z238-Microtower-Workstation sshd\[14522\]: Failed password for games from 153.3.232.177 port 50566 ssh2
Nov 22 15:05:55 vibhu-HP-Z238-Microtower-Workstation sshd\[14798\]: Invalid user hiroe from 153.3.232.177
Nov 22 15:05:55 vibhu-HP-Z238-Microtower-Workstation sshd\[14798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.3.232.177
...
2019-11-22 18:49:00
194.102.35.245 attackbots
$f2bV_matches
2019-11-22 19:10:23
138.197.93.133 attackspam
Nov 22 12:05:03 server sshd\[8288\]: Invalid user peluso from 138.197.93.133
Nov 22 12:05:03 server sshd\[8288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.93.133 
Nov 22 12:05:04 server sshd\[8288\]: Failed password for invalid user peluso from 138.197.93.133 port 34950 ssh2
Nov 22 12:23:11 server sshd\[13646\]: Invalid user cmaryk from 138.197.93.133
Nov 22 12:23:11 server sshd\[13646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.93.133 
...
2019-11-22 19:17:31
159.89.205.153 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-11-22 19:11:34
213.32.65.111 attackbots
Nov 22 11:04:58 * sshd[26403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.65.111
Nov 22 11:05:00 * sshd[26403]: Failed password for invalid user bialkenius from 213.32.65.111 port 58602 ssh2
2019-11-22 18:51:52

Recently Reported IPs

2606:4700:10::6816:2725 2606:4700:10::6816:3803 2606:4700:10::6814:9350 110.78.158.81
2606:4700:10::6816:441d 2606:4700:10::6814:9878 197.215.74.227 85.208.48.192
2606:4700:10::6816:4229 2606:4700:10::6816:2630 2606:4700:10::ac43:2848 2606:4700:10::6814:6842
2606:4700:10::6816:289 2606:4700:10::ac43:2797 2606:4700:10::6814:9527 2606:4700:10::6814:8223
88.101.166.227 88.101.166.112 10.0.0.208 121.40.57.225