Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.85.164.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52715
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.85.164.42.			IN	A

;; AUTHORITY SECTION:
.			286	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030200 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 13:41:25 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 42.164.85.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.164.85.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
209.217.192.148 attackbotsspam
Jan 22 00:28:36 vtv3 sshd\[20789\]: Invalid user mumbleserver from 209.217.192.148 port 36532
Jan 22 00:28:36 vtv3 sshd\[20789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.217.192.148
Jan 22 00:28:38 vtv3 sshd\[20789\]: Failed password for invalid user mumbleserver from 209.217.192.148 port 36532 ssh2
Jan 22 00:32:22 vtv3 sshd\[21940\]: Invalid user chino from 209.217.192.148 port 36422
Jan 22 00:32:22 vtv3 sshd\[21940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.217.192.148
Mar  9 19:32:21 vtv3 sshd\[1217\]: Invalid user team1 from 209.217.192.148 port 54460
Mar  9 19:32:21 vtv3 sshd\[1217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.217.192.148
Mar  9 19:32:23 vtv3 sshd\[1217\]: Failed password for invalid user team1 from 209.217.192.148 port 54460 ssh2
Mar  9 19:38:32 vtv3 sshd\[3630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 e
2019-09-28 07:00:29
96.127.158.234 attackbots
...
2019-09-28 06:47:51
220.130.178.36 attackbotsspam
2019-09-27T18:15:25.7654611495-001 sshd\[26621\]: Invalid user nn from 220.130.178.36 port 49744
2019-09-27T18:15:25.7686411495-001 sshd\[26621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-130-178-36.hinet-ip.hinet.net
2019-09-27T18:15:27.8552311495-001 sshd\[26621\]: Failed password for invalid user nn from 220.130.178.36 port 49744 ssh2
2019-09-27T18:19:39.8909681495-001 sshd\[27039\]: Invalid user adorno from 220.130.178.36 port 33124
2019-09-27T18:19:39.9016081495-001 sshd\[27039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-130-178-36.hinet-ip.hinet.net
2019-09-27T18:19:41.8584331495-001 sshd\[27039\]: Failed password for invalid user adorno from 220.130.178.36 port 33124 ssh2
...
2019-09-28 06:42:55
106.75.17.245 attack
Automatic report - Banned IP Access
2019-09-28 06:51:42
93.95.56.130 attackbots
Sep 28 01:08:34 core sshd[18281]: Invalid user 12345 from 93.95.56.130 port 59498
Sep 28 01:08:37 core sshd[18281]: Failed password for invalid user 12345 from 93.95.56.130 port 59498 ssh2
...
2019-09-28 07:10:18
189.213.161.231 attackbots
Automatic report - Port Scan Attack
2019-09-28 07:06:30
51.68.203.205 attack
Port scan on 2 port(s): 139 445
2019-09-28 06:48:52
217.16.11.115 attack
Sep 27 22:14:23 anodpoucpklekan sshd[29823]: Invalid user djordan from 217.16.11.115 port 2861
...
2019-09-28 06:41:03
112.29.140.213 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-28 06:33:09
213.182.101.187 attackspambots
Sep 27 12:28:32 hcbb sshd\[26271\]: Invalid user admission from 213.182.101.187
Sep 27 12:28:32 hcbb sshd\[26271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-leasedline-213-182-101-187-teleos.ewe-ip-backbone.de
Sep 27 12:28:34 hcbb sshd\[26271\]: Failed password for invalid user admission from 213.182.101.187 port 37100 ssh2
Sep 27 12:35:48 hcbb sshd\[26889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-leasedline-213-182-101-187-teleos.ewe-ip-backbone.de  user=daemon
Sep 27 12:35:50 hcbb sshd\[26889\]: Failed password for daemon from 213.182.101.187 port 49614 ssh2
2019-09-28 06:43:11
203.195.254.67 attackbots
Automatic report generated by Wazuh
2019-09-28 07:03:36
67.160.99.70 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/67.160.99.70/ 
 US - 1H : (613)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN7922 
 
 IP : 67.160.99.70 
 
 CIDR : 67.160.0.0/11 
 
 PREFIX COUNT : 1512 
 
 UNIQUE IP COUNT : 70992640 
 
 
 WYKRYTE ATAKI Z ASN7922 :  
  1H - 1 
  3H - 2 
  6H - 7 
 12H - 20 
 24H - 51 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-28 06:44:02
138.117.109.103 attackbotsspam
Sep 27 12:37:24 hpm sshd\[24453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.109.103  user=root
Sep 27 12:37:26 hpm sshd\[24453\]: Failed password for root from 138.117.109.103 port 58625 ssh2
Sep 27 12:42:10 hpm sshd\[25004\]: Invalid user vision from 138.117.109.103
Sep 27 12:42:10 hpm sshd\[25004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.109.103
Sep 27 12:42:13 hpm sshd\[25004\]: Failed password for invalid user vision from 138.117.109.103 port 43296 ssh2
2019-09-28 06:50:49
142.93.198.152 attackspam
Sep 28 02:00:04 server sshd\[13582\]: Invalid user saints1 from 142.93.198.152 port 39036
Sep 28 02:00:04 server sshd\[13582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.152
Sep 28 02:00:05 server sshd\[13582\]: Failed password for invalid user saints1 from 142.93.198.152 port 39036 ssh2
Sep 28 02:04:01 server sshd\[27753\]: Invalid user sharon from 142.93.198.152 port 50256
Sep 28 02:04:01 server sshd\[27753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.152
2019-09-28 07:08:05
218.150.220.202 attackspam
Invalid user sysadmin from 218.150.220.202 port 45518
2019-09-28 06:37:32

Recently Reported IPs

112.85.164.40 112.85.164.46 112.85.164.48 112.85.164.50
112.85.164.57 112.85.164.59 112.85.164.61 112.85.164.62
112.85.164.64 112.85.164.68 112.85.164.70 112.85.164.72
112.85.164.77 112.85.164.78 112.85.164.8 112.85.164.80
112.85.164.83 112.85.164.93 112.85.164.94 112.85.165.0