Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.49.85.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8625
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.49.85.16.			IN	A

;; AUTHORITY SECTION:
.			518	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100601 1800 900 604800 86400

;; Query time: 192 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 03:17:47 CST 2022
;; MSG SIZE  rcvd: 105
Host info
16.85.49.109.in-addr.arpa domain name pointer a109-49-85-16.cpe.netcabo.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.85.49.109.in-addr.arpa	name = a109-49-85-16.cpe.netcabo.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
168.187.36.193 attackbots
Unauthorized connection attempt from IP address 168.187.36.193 on Port 445(SMB)
2020-03-18 10:21:18
54.36.54.24 attack
Mar 17 08:11:50 web1 sshd\[9015\]: Invalid user wordpress from 54.36.54.24
Mar 17 08:11:50 web1 sshd\[9015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.54.24
Mar 17 08:11:52 web1 sshd\[9015\]: Failed password for invalid user wordpress from 54.36.54.24 port 58178 ssh2
Mar 17 08:15:18 web1 sshd\[9339\]: Invalid user direction from 54.36.54.24
Mar 17 08:15:18 web1 sshd\[9339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.54.24
2020-03-18 10:08:51
142.93.159.29 attack
Invalid user niiv from 142.93.159.29 port 41606
2020-03-18 10:29:12
182.61.4.93 attackbots
Invalid user aaron from 182.61.4.93 port 38924
2020-03-18 10:22:43
5.123.162.44 attack
Unauthorized connection attempt from IP address 5.123.162.44 on Port 445(SMB)
2020-03-18 09:50:06
113.193.30.98 attack
Mar 18 01:07:37 SilenceServices sshd[17124]: Failed password for root from 113.193.30.98 port 51510 ssh2
Mar 18 01:11:48 SilenceServices sshd[24506]: Failed password for root from 113.193.30.98 port 30596 ssh2
2020-03-18 09:49:11
180.247.86.86 attack
Unauthorized connection attempt from IP address 180.247.86.86 on Port 445(SMB)
2020-03-18 10:11:42
177.67.182.135 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 10:20:00
36.228.219.25 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 09:46:09
107.170.204.148 attackbotsspam
Mar 18 01:32:54 ns41 sshd[25198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.204.148
2020-03-18 09:59:35
86.252.251.146 attack
SSH-BruteForce
2020-03-18 10:21:05
184.105.247.247 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 10:27:23
45.143.220.28 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 26 - port: 5059 proto: UDP cat: Misc Attack
2020-03-18 09:48:45
109.117.173.177 attackbotsspam
trying to access non-authorized port
2020-03-18 10:16:08
14.166.162.172 attack
Unauthorized connection attempt from IP address 14.166.162.172 on Port 445(SMB)
2020-03-18 10:03:14

Recently Reported IPs

180.108.202.174 104.227.247.121 189.218.82.34 113.102.205.88
39.109.115.158 109.252.21.172 167.172.70.217 142.93.189.172
191.131.140.78 49.231.73.240 58.150.34.236 183.155.211.101
20.10.148.159 185.230.146.79 114.220.182.146 221.216.141.169
98.191.200.242 67.205.137.197 128.90.162.228 128.90.152.233