Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Litochoro

Region: Central Macedonia

Country: Greece

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.85.104.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20748
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.85.104.45.			IN	A

;; AUTHORITY SECTION:
.			252	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063000 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 30 21:26:51 CST 2022
;; MSG SIZE  rcvd: 104
Host info
45.104.85.2.in-addr.arpa domain name pointer ppp-2-85-104-45.home.otenet.gr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.104.85.2.in-addr.arpa	name = ppp-2-85-104-45.home.otenet.gr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.35.118.42 attack
$f2bV_matches
2020-05-05 16:30:56
118.24.70.248 attack
May  5 06:17:24 ns382633 sshd\[6210\]: Invalid user admin from 118.24.70.248 port 49946
May  5 06:17:24 ns382633 sshd\[6210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.70.248
May  5 06:17:26 ns382633 sshd\[6210\]: Failed password for invalid user admin from 118.24.70.248 port 49946 ssh2
May  5 06:33:23 ns382633 sshd\[10019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.70.248  user=root
May  5 06:33:25 ns382633 sshd\[10019\]: Failed password for root from 118.24.70.248 port 53728 ssh2
2020-05-05 16:06:18
62.117.96.63 attackspambots
$f2bV_matches
2020-05-05 16:00:49
45.142.195.7 attackbots
May  5 10:17:14 relay postfix/smtpd\[6551\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  5 10:17:31 relay postfix/smtpd\[27576\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  5 10:18:05 relay postfix/smtpd\[32171\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  5 10:18:22 relay postfix/smtpd\[26985\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  5 10:18:56 relay postfix/smtpd\[6551\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-05 16:23:55
1.9.46.177 attack
$f2bV_matches
2020-05-05 16:29:48
120.127.233.88 attackspam
port scan and connect, tcp 22 (ssh)
2020-05-05 16:19:24
68.200.45.140 normal
Logged onto my private facebook account not allowed by me
2020-05-05 16:36:24
84.47.111.110 attackbotsspam
proto=tcp  .  spt=35178  .  dpt=25  .     Found on   Dark List de      (118)
2020-05-05 16:27:10
178.128.58.117 attackspambots
Observed on multiple hosts.
2020-05-05 16:35:55
106.243.2.244 attackspam
$f2bV_matches
2020-05-05 16:34:08
115.220.3.88 attack
$f2bV_matches
2020-05-05 16:42:21
85.208.213.24 attackspam
fail2ban -- 85.208.213.24
...
2020-05-05 16:12:01
134.122.16.19 attackbotsspam
Port scan(s) denied
2020-05-05 16:10:33
121.229.49.85 attackbots
$f2bV_matches
2020-05-05 16:03:26
2.139.220.30 attack
2020-05-05T02:03:15.005008linuxbox-skyline sshd[185809]: Invalid user pwrchute from 2.139.220.30 port 35462
...
2020-05-05 16:36:57

Recently Reported IPs

211.227.97.39 173.219.148.134 43.154.211.252 93.187.182.169
103.104.107.93 95.181.148.253 118.36.109.186 137.226.125.32
137.226.232.105 200.29.105.115 50.81.60.111 137.226.232.66
138.99.176.139 131.161.11.71 95.170.153.38 86.143.71.38
210.97.53.178 121.234.179.157 123.235.157.140 179.43.167.10