Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Greece

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.242.85.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29071
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.242.85.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 04:55:41 CST 2025
;; MSG SIZE  rcvd: 106
Host info
54.85.242.109.in-addr.arpa domain name pointer adsl-54.109.242.85.tellas.gr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.85.242.109.in-addr.arpa	name = adsl-54.109.242.85.tellas.gr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.173 attack
v+ssh-bruteforce
2020-01-13 06:39:14
115.159.196.214 attackbots
Jan 12 02:49:08 server sshd\[8816\]: Failed password for invalid user spooky from 115.159.196.214 port 49226 ssh2
Jan 13 01:26:14 server sshd\[27436\]: Invalid user test from 115.159.196.214
Jan 13 01:26:14 server sshd\[27436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.196.214 
Jan 13 01:26:16 server sshd\[27436\]: Failed password for invalid user test from 115.159.196.214 port 38592 ssh2
Jan 13 01:29:29 server sshd\[27970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.196.214  user=root
...
2020-01-13 06:36:58
45.66.199.212 attackspam
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2020-01-13 06:21:24
36.110.3.50 attackbots
Unauthorized connection attempt detected from IP address 36.110.3.50 to port 1433 [J]
2020-01-13 06:38:10
112.85.42.172 attack
2020-01-10 06:36:47 -> 2020-01-12 22:41:17 : 36 login attempts (112.85.42.172)
2020-01-13 06:05:34
45.119.84.254 attackspambots
Brute-force attempt banned
2020-01-13 06:13:08
186.92.48.255 attack
Unauthorized connection attempt detected from IP address 186.92.48.255 to port 445
2020-01-13 06:06:23
190.236.197.96 attackbotsspam
1578864477 - 01/12/2020 22:27:57 Host: 190.236.197.96/190.236.197.96 Port: 445 TCP Blocked
2020-01-13 06:26:28
27.72.45.221 attack
Unauthorized connection attempt detected from IP address 27.72.45.221 to port 445
2020-01-13 06:33:27
90.76.151.113 attackbotsspam
Invalid user testuser from 90.76.151.113 port 50116
2020-01-13 06:35:34
106.13.23.149 attack
Unauthorized connection attempt detected from IP address 106.13.23.149 to port 2220 [J]
2020-01-13 06:29:42
49.88.112.61 attackspambots
Jan 12 23:32:03 legacy sshd[17982]: Failed password for root from 49.88.112.61 port 27678 ssh2
Jan 12 23:32:16 legacy sshd[17982]: error: maximum authentication attempts exceeded for root from 49.88.112.61 port 27678 ssh2 [preauth]
Jan 12 23:32:22 legacy sshd[17991]: Failed password for root from 49.88.112.61 port 2184 ssh2
...
2020-01-13 06:33:07
222.186.31.83 attackspambots
Unauthorized connection attempt detected from IP address 222.186.31.83 to port 22 [J]
2020-01-13 06:35:07
89.248.168.226 attackspambots
Jan 12 23:02:46 debian-2gb-nbg1-2 kernel: \[1125871.252935\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.168.226 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=55368 PROTO=TCP SPT=58460 DPT=544 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-13 06:08:36
157.52.252.154 attack
Automatic report - Port Scan Attack
2020-01-13 06:08:51

Recently Reported IPs

191.157.138.107 145.151.107.33 223.40.186.153 27.255.103.185
76.45.13.187 77.156.170.80 81.77.49.107 85.177.114.214
35.232.92.71 79.85.197.48 140.38.196.7 56.132.248.140
155.165.12.70 242.51.216.233 8.173.197.104 206.30.248.151
175.25.96.91 29.21.182.217 220.183.229.164 189.200.84.122