Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.243.249.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7262
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.243.249.85.			IN	A

;; AUTHORITY SECTION:
.			0	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:47:39 CST 2022
;; MSG SIZE  rcvd: 107
Host info
85.249.243.136.in-addr.arpa domain name pointer server1.memory-pc.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.249.243.136.in-addr.arpa	name = server1.memory-pc.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.89.238.166 attackbots
Invalid user admin from 183.89.238.166 port 46517
2020-01-19 00:54:42
5.29.191.195 attackspam
Unauthorized connection attempt detected from IP address 5.29.191.195 to port 2220 [J]
2020-01-19 01:27:43
115.165.166.193 attackbots
no
2020-01-19 01:06:48
121.229.29.86 attack
Unauthorized connection attempt detected from IP address 121.229.29.86 to port 2220 [J]
2020-01-19 01:06:20
88.26.231.224 attackbotsspam
leo_www
2020-01-19 01:15:25
50.239.163.172 attackspam
Jan 18 17:29:56 cp sshd[4573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.163.172
2020-01-19 01:20:28
189.135.128.129 attack
Invalid user andrew from 189.135.128.129 port 37902
2020-01-19 00:51:18
122.51.163.237 attack
Invalid user horia from 122.51.163.237 port 46262
2020-01-19 01:06:07
111.231.89.162 attackspambots
Jan 18 16:36:47 vps58358 sshd\[16008\]: Invalid user user from 111.231.89.162Jan 18 16:36:49 vps58358 sshd\[16008\]: Failed password for invalid user user from 111.231.89.162 port 55312 ssh2Jan 18 16:40:29 vps58358 sshd\[16147\]: Invalid user vu from 111.231.89.162Jan 18 16:40:32 vps58358 sshd\[16147\]: Failed password for invalid user vu from 111.231.89.162 port 53410 ssh2Jan 18 16:44:15 vps58358 sshd\[16229\]: Invalid user csgoserver from 111.231.89.162Jan 18 16:44:17 vps58358 sshd\[16229\]: Failed password for invalid user csgoserver from 111.231.89.162 port 51510 ssh2
...
2020-01-19 01:09:10
197.62.182.13 attackspam
Invalid user admin from 197.62.182.13 port 36554
2020-01-19 00:49:44
165.22.112.87 attackbotsspam
Jan 18 11:44:33 ny01 sshd[20231]: Failed password for root from 165.22.112.87 port 44730 ssh2
Jan 18 11:47:45 ny01 sshd[20585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.112.87
Jan 18 11:47:48 ny01 sshd[20585]: Failed password for invalid user youn from 165.22.112.87 port 46306 ssh2
2020-01-19 00:57:55
154.8.209.24 attack
Invalid user ddd from 154.8.209.24 port 53006
2020-01-19 01:00:40
51.91.159.46 attackbotsspam
SSH bruteforce
2020-01-19 01:20:14
5.253.17.160 attackspam
Invalid user user1 from 5.253.17.160 port 44894
2020-01-19 01:26:25
49.232.97.184 attackspambots
Autoban   49.232.97.184 CONNECT/AUTH
2020-01-19 01:22:34

Recently Reported IPs

136.243.25.117 136.243.238.37 136.243.25.11 136.243.25.118
136.243.25.119 136.243.25.122 136.243.25.12 136.243.25.120
136.243.25.83 136.243.25.85 136.243.25.82 136.243.25.80
136.243.25.86 136.243.25.121 136.243.25.84 136.243.25.87
136.243.25.88 136.243.25.89 136.243.250.225 136.243.25.90