Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: São Paulo

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
212.85.137.121 attackbotsspam
22/tcp
[2020-04-01]1pkt
2020-04-01 21:43:57
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '212.85.8.0 - 212.85.15.255'

% Abuse contact for '212.85.8.0 - 212.85.15.255' is 'abuse@hostinger.com'

inetnum:        212.85.8.0 - 212.85.15.255
netname:        HOSTINGER-HOSTING
country:        BR
admin-c:        HN1858-RIPE
tech-c:         HN1858-RIPE
org:            ORG-HIL7-RIPE
geoloc:         -23.533773 -46.625290
geofeed:        https://raw.githubusercontent.com/hostinger/geofeed/main/geofeed.csv
status:         SUB-ALLOCATED PA
mnt-by:         MNT-HOSTINGER
mnt-by:         TERRATRANSIT-MNT
created:        2025-02-26T12:52:01Z
last-modified:  2025-04-09T11:12:29Z
source:         RIPE

organisation:   ORG-HIL7-RIPE
org-name:       Hostinger International Limited
org-type:       OTHER
descr:          Hostinger International Ltd.
address:        61 Lordou Vyronos Lumiel Building, 4th floor
address:        6023
address:        Larnaca
address:        CYPRUS
phone:          +37064503378
fax-no:         +37064503378
abuse-c:        HA2755-RIPE
mnt-ref:        TERRATRANSIT-MNT
mnt-ref:        de-net1-1-mnt
mnt-by:         TERRATRANSIT-MNT
mnt-ref:        de-tt1data-1-mnt
created:        2017-01-30T15:13:27Z
last-modified:  2024-05-15T19:42:27Z
source:         RIPE # Filtered

person:         Hostinger NOC
address:        Hostinger International Ltd.
address:        61 Lordou Vyronos
address:        Lumiel Building, 4th floor
address:        6023
address:        Larnaca
address:        CYPRUS
phone:          +37064503378
nic-hdl:        HN1858-RIPE
mnt-by:         HN19812-MNT
created:        2013-12-02T20:17:12Z
last-modified:  2025-11-26T06:38:52Z
source:         RIPE # Filtered

% Information related to '212.85.8.0/21AS47583'

route:          212.85.8.0/21
origin:         AS47583
descr:          HOSTINGER BR
mnt-by:         MNT-HOSTINGER
mnt-by:         lir-lt-hostinger-1-MNT
created:        2025-04-09T11:13:46Z
last-modified:  2025-04-09T11:13:46Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.85.13.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22735
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.85.13.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040401 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 05 05:30:05 CST 2026
;; MSG SIZE  rcvd: 105
Host info
85.13.85.212.in-addr.arpa domain name pointer srv1373594.hstgr.cloud.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.13.85.212.in-addr.arpa	name = srv1373594.hstgr.cloud.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.172.151.241 attackbotsspam
02/17/2020-23:57:05.982117 213.172.151.241 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-18 14:15:23
67.205.12.204 attack
Automatic report - XMLRPC Attack
2020-02-18 14:11:29
95.177.169.9 attackspambots
Tried sshing with brute force.
2020-02-18 13:53:55
49.69.240.114 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 14:12:01
49.69.243.86 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 13:51:55
192.241.210.224 attackspambots
Feb 18 07:15:49 sd-53420 sshd\[23916\]: Invalid user vyatta from 192.241.210.224
Feb 18 07:15:49 sd-53420 sshd\[23916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.210.224
Feb 18 07:15:51 sd-53420 sshd\[23916\]: Failed password for invalid user vyatta from 192.241.210.224 port 44218 ssh2
Feb 18 07:18:15 sd-53420 sshd\[24120\]: Invalid user gnuworld from 192.241.210.224
Feb 18 07:18:15 sd-53420 sshd\[24120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.210.224
...
2020-02-18 14:30:08
49.69.240.44 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 14:01:27
210.249.92.244 attackbots
Feb 18 04:54:53 game-panel sshd[6698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.249.92.244
Feb 18 04:54:56 game-panel sshd[6698]: Failed password for invalid user 123456 from 210.249.92.244 port 51510 ssh2
Feb 18 04:57:31 game-panel sshd[6818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.249.92.244
2020-02-18 13:57:22
79.137.33.20 attackbots
Feb 18 04:57:01 marvibiene sshd[42813]: Invalid user ftpuser from 79.137.33.20 port 41004
Feb 18 04:57:01 marvibiene sshd[42813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.33.20
Feb 18 04:57:01 marvibiene sshd[42813]: Invalid user ftpuser from 79.137.33.20 port 41004
Feb 18 04:57:04 marvibiene sshd[42813]: Failed password for invalid user ftpuser from 79.137.33.20 port 41004 ssh2
...
2020-02-18 14:18:25
45.238.204.12 attack
Automatic report - Port Scan Attack
2020-02-18 14:24:58
105.73.80.253 attack
Unauthorised access (Feb 18) SRC=105.73.80.253 LEN=44 TTL=240 ID=62451 TCP DPT=1433 WINDOW=1024 SYN
2020-02-18 13:53:03
178.128.247.181 attack
Fail2Ban Ban Triggered
2020-02-18 14:21:15
113.174.52.49 attackspambots
Unauthorised access (Feb 18) SRC=113.174.52.49 LEN=44 TTL=51 ID=11147 TCP DPT=23 WINDOW=46206 SYN
2020-02-18 14:14:04
120.42.133.249 attackspam
Feb 18 06:11:52 silence02 sshd[30087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.42.133.249
Feb 18 06:11:54 silence02 sshd[30087]: Failed password for invalid user db4web from 120.42.133.249 port 45509 ssh2
Feb 18 06:21:45 silence02 sshd[30540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.42.133.249
2020-02-18 14:01:56
51.254.123.127 attackspambots
Invalid user ts from 51.254.123.127 port 47771
2020-02-18 13:59:31

Recently Reported IPs

2606:4700:10::6816:1490 2606:4700:10::ac43:2885 2606:4700:10::6814:9766 2606:4700:10::6814:8415
2606:4700:10::6816:655 2606:4700:10::6814:5116 47.128.123.143 193.46.255.158
34.76.35.74 2606:4700:10::6816:3901 2606:4700:10::6816:1141 2606:4700:10::6814:4777
2606:4700:10::6816:4485 2606:4700:10::6814:7396 121.230.89.76 44.220.188.51
23.125.204.234 220.197.78.246 220.167.232.154 208.190.163.230