Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '85.30.178.0 - 85.30.178.255'

% Abuse contact for '85.30.178.0 - 85.30.178.255' is 'abuse@teleservice.net'

inetnum:        85.30.178.0 - 85.30.178.255
netname:        TELESERVICE-SE
descr:          TOM-FTTH-HSI
remarks:        INFRA-AW
country:        SE
admin-c:        TR1369-RIPE
tech-c:         TR1369-RIPE
status:         ASSIGNED PA
mnt-by:         TELESERVICE-MNT
created:        2012-04-12T09:25:05Z
last-modified:  2012-04-12T09:25:05Z
source:         RIPE

role:           TELESERVICE ROLE
address:        Teleservice Bredband Skane AB
address:        Vastergatan 14 S-275 23 SJOBO Sweden
phone:          +46 416-585000
fax-no:         +46 416-585010
abuse-mailbox:  abuse@teleservice.net
admin-c:        JA838-RIPE
tech-c:         JA838-RIPE
mnt-by:         TELESERVICE-MNT
nic-hdl:        TR1369-RIPE
created:        2005-07-24T18:42:42Z
last-modified:  2011-07-26T08:34:38Z
source:         RIPE # Filtered

% Information related to '85.30.128.0/18AS34244'

route:          85.30.128.0/18
origin:         AS34244
mnt-by:         TELESERVICE-MNT
created:        2025-03-09T22:14:20Z
last-modified:  2025-03-09T22:14:20Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.30.178.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20673
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.30.178.162.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 12:42:18 CST 2026
;; MSG SIZE  rcvd: 106
Host info
162.178.30.85.in-addr.arpa domain name pointer host-85-30-178-162.sydskane.nu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
162.178.30.85.in-addr.arpa	name = host-85-30-178-162.sydskane.nu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.35.168.220 attackbots
Icarus honeypot on github
2020-09-06 03:56:24
62.194.207.217 attackbotsspam
Sep  4 18:44:54 mellenthin postfix/smtpd[31059]: NOQUEUE: reject: RCPT from h207217.upc-h.chello.nl[62.194.207.217]: 554 5.7.1 Service unavailable; Client host [62.194.207.217] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/62.194.207.217; from= to= proto=ESMTP helo=
2020-09-06 04:14:58
218.51.205.132 attackspambots
SSH Brute-Forcing (server1)
2020-09-06 04:10:07
165.22.89.225 attackspam
IP blocked
2020-09-06 04:09:47
190.2.215.22 attackspam
Sep  4 18:44:50 mellenthin postfix/smtpd[32087]: NOQUEUE: reject: RCPT from unknown[190.2.215.22]: 554 5.7.1 Service unavailable; Client host [190.2.215.22] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/190.2.215.22; from= to= proto=ESMTP helo=
2020-09-06 04:15:38
52.173.28.92 attackspambots
Sep  3 18:17:36 finn sshd[31529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.173.28.92  user=r.r
Sep  3 18:17:38 finn sshd[31529]: Failed password for r.r from 52.173.28.92 port 59198 ssh2
Sep  3 18:17:38 finn sshd[31529]: Received disconnect from 52.173.28.92 port 59198:11: Bye Bye [preauth]
Sep  3 18:17:38 finn sshd[31529]: Disconnected from 52.173.28.92 port 59198 [preauth]
Sep  3 18:31:24 finn sshd[3950]: Invalid user rachel from 52.173.28.92 port 32910
Sep  3 18:31:24 finn sshd[3950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.173.28.92
Sep  3 18:31:26 finn sshd[3950]: Failed password for invalid user rachel from 52.173.28.92 port 32910 ssh2
Sep  3 18:31:26 finn sshd[3950]: Received disconnect from 52.173.28.92 port 32910:11: Bye Bye [preauth]
Sep  3 18:31:26 finn sshd[3950]: Disconnected from 52.173.28.92 port 32910 [preauth]
Sep  3 18:36:00 finn sshd[5255]: Invalid use........
-------------------------------
2020-09-06 04:20:01
159.203.74.227 attackbotsspam
Sep  5 21:40:08 minden010 sshd[31495]: Failed password for root from 159.203.74.227 port 44090 ssh2
Sep  5 21:44:52 minden010 sshd[1051]: Failed password for root from 159.203.74.227 port 52152 ssh2
...
2020-09-06 04:21:46
122.226.73.50 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2020-09-06 03:59:29
78.128.113.42 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 64 - port: 5907 proto: tcp cat: Misc Attackbytes: 60
2020-09-06 04:17:20
45.123.221.174 attack
hacking
2020-09-06 04:13:23
105.112.101.250 attack
Unauthorized connection attempt from IP address 105.112.101.250 on Port 445(SMB)
2020-09-06 04:01:06
188.195.136.33 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-05T19:34:29Z and 2020-09-05T19:51:33Z
2020-09-06 04:16:52
1.7.161.234 attackspam
Wordpress attack
2020-09-06 04:08:47
107.172.140.119 attackspambots
 TCP (SYN) 107.172.140.119:10771 -> port 22, len 48
2020-09-06 04:11:44
200.73.128.90 attack
$f2bV_matches
2020-09-06 04:18:28

Recently Reported IPs

10.216.48.185 2606:4700:10::ac43:1452 2606:4700:10::6814:7585 2606:4700:10::6814:6643
2606:4700:10::6814:8334 188.92.243.218 170.130.204.74 2606:4700:10::6816:1131
2606:4700:10::6814:5551 110.78.138.213 2606:4700:10::ac43:1133 2606:4700:10::6816:3550
110.78.138.87 2606:4700:10::6814:7857 2606:4700:10::6816:4317 2606:4700:10::6816:160
2606:4700:10::ac43:1492 2606:4700:10::6816:3823 2606:4700:10::6816:3814 2606:4700:10::6814:5329