Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.7.244.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19666
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.7.244.75.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 23:51:02 CST 2025
;; MSG SIZE  rcvd: 104
Host info
75.244.7.85.in-addr.arpa domain name pointer 75.244.7.85.dynamic.cust.swisscom.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
75.244.7.85.in-addr.arpa	name = 75.244.7.85.dynamic.cust.swisscom.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.140.30.237 attackspam
Honeypot attack, port: 81, PTR: 79.140.30.237.static.ufanet.ru.
2020-09-07 01:28:51
139.162.75.112 attackspam
Sep  6 06:06:46 propaganda sshd[19094]: Connection from 139.162.75.112 port 59786 on 10.0.0.161 port 22 rdomain ""
Sep  6 06:06:46 propaganda sshd[19094]: error: kex_exchange_identification: Connection closed by remote host
2020-09-07 01:24:33
31.28.253.97 attack
Unauthorized connection attempt from IP address 31.28.253.97 on Port 445(SMB)
2020-09-07 01:30:15
68.183.51.204 attackspambots
IP 68.183.51.204 attacked honeypot on port: 80 at 9/6/2020 6:02:07 AM
2020-09-07 00:58:04
182.61.12.9 attackbotsspam
Sep  6 04:42:55 jumpserver sshd[8774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.12.9 
Sep  6 04:42:55 jumpserver sshd[8774]: Invalid user damri from 182.61.12.9 port 57188
Sep  6 04:42:57 jumpserver sshd[8774]: Failed password for invalid user damri from 182.61.12.9 port 57188 ssh2
...
2020-09-07 00:56:21
85.214.151.144 attackspam
Unauthorized connection attempt from IP address 85.214.151.144 on Port 445(SMB)
2020-09-07 01:32:55
141.98.9.163 attack
Sep  6 16:59:57 marvibiene sshd[45932]: Invalid user admin from 141.98.9.163 port 34939
Sep  6 16:59:57 marvibiene sshd[45932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.163
Sep  6 16:59:57 marvibiene sshd[45932]: Invalid user admin from 141.98.9.163 port 34939
Sep  6 16:59:59 marvibiene sshd[45932]: Failed password for invalid user admin from 141.98.9.163 port 34939 ssh2
2020-09-07 01:08:17
185.142.236.40 attackspam
Scanning an empty webserver with deny all robots.txt
2020-09-07 00:50:28
116.109.234.188 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 01:01:36
121.179.219.78 attack
Attempted connection to port 81.
2020-09-07 01:21:28
85.233.65.144 attackspambots
Port probing on unauthorized port 445
2020-09-07 00:55:46
134.17.94.214 attack
Sep  6 05:40:14 ws22vmsma01 sshd[95394]: Failed password for root from 134.17.94.214 port 12212 ssh2
Sep  6 08:32:48 ws22vmsma01 sshd[218811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.214
...
2020-09-07 01:11:09
180.93.230.211 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 01:03:17
121.32.46.29 attackspambots
Attempted connection to port 445.
2020-09-07 01:21:59
202.154.40.18 attackbotsspam
Automatic report - Banned IP Access
2020-09-07 01:16:25

Recently Reported IPs

247.112.0.239 177.9.91.58 225.56.115.46 174.168.169.28
45.104.84.131 72.140.79.177 185.232.196.43 203.121.198.206
60.32.180.90 221.182.159.40 209.192.249.160 118.244.122.101
4.218.140.227 162.69.117.150 119.237.104.143 39.60.100.255
234.199.64.99 91.141.92.151 53.126.37.251 127.147.205.37