Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tallinn

Region: Harjumaa

Country: Estonia

Internet Service Provider: Elisa

Hostname: unknown

Organization: Elisa Teleteenused AS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.253.58.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44099
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.253.58.68.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062201 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 22 16:08:57 CST 2019
;; MSG SIZE  rcvd: 116
Host info
68.58.253.85.in-addr.arpa domain name pointer 85.253.58.68.cable.starman.ee.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
68.58.253.85.in-addr.arpa	name = 85.253.58.68.cable.starman.ee.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.42.255.250 attack
Unauthorized connection attempt detected from IP address 93.42.255.250 to port 80 [J]
2020-01-07 20:01:47
201.1.184.106 attackbots
Unauthorized connection attempt detected from IP address 201.1.184.106 to port 23 [J]
2020-01-07 20:16:34
88.122.92.128 proxy
tcm38
2020-01-07 20:17:50
118.46.104.164 attack
Unauthorized connection attempt detected from IP address 118.46.104.164 to port 4567 [J]
2020-01-07 19:54:39
121.123.84.151 attackbotsspam
Unauthorized connection attempt detected from IP address 121.123.84.151 to port 81 [J]
2020-01-07 19:53:43
110.168.65.216 attackspam
Unauthorized connection attempt detected from IP address 110.168.65.216 to port 23 [J]
2020-01-07 19:58:29
95.132.202.206 attackspam
Unauthorized connection attempt detected from IP address 95.132.202.206 to port 23 [J]
2020-01-07 20:01:30
118.163.134.100 attackbots
Unauthorized connection attempt detected from IP address 118.163.134.100 to port 81 [J]
2020-01-07 19:54:11
89.235.78.95 attackspambots
Unauthorized connection attempt detected from IP address 89.235.78.95 to port 4567
2020-01-07 20:03:10
27.106.50.245 attack
Unauthorized connection attempt detected from IP address 27.106.50.245 to port 23 [J]
2020-01-07 20:11:17
60.221.255.176 attackbots
Unauthorized connection attempt detected from IP address 60.221.255.176 to port 2220 [J]
2020-01-07 20:07:23
159.65.255.153 attackspam
Unauthorized connection attempt detected from IP address 159.65.255.153 to port 2220 [J]
2020-01-07 19:49:16
114.35.98.88 attackspambots
Unauthorized connection attempt detected from IP address 114.35.98.88 to port 1433 [J]
2020-01-07 19:56:17
2.87.240.188 attackbotsspam
Unauthorized connection attempt detected from IP address 2.87.240.188 to port 88 [J]
2020-01-07 19:40:05
14.161.6.201 attack
Jan  7 11:30:45 MK-Soft-VM4 sshd[19465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.6.201 
...
2020-01-07 19:39:19

Recently Reported IPs

50.126.159.226 210.156.80.33 119.120.163.211 165.164.22.211
1.55.227.115 220.189.218.243 45.116.233.37 73.136.30.106
70.21.124.122 114.83.226.79 90.184.101.194 177.88.115.63
84.2.125.86 17.39.82.175 61.0.247.115 180.242.223.217
227.33.161.81 160.26.248.200 81.62.16.80 122.236.219.146