Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.6.85.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15279
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.6.85.104.			IN	A

;; AUTHORITY SECTION:
.			588	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023060600 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 06 16:32:16 CST 2023
;; MSG SIZE  rcvd: 104
Host info
Host 104.85.6.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.85.6.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
142.93.211.52 attackbotsspam
Jan 20 15:09:51 vpn01 sshd[24668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.211.52
Jan 20 15:09:52 vpn01 sshd[24668]: Failed password for invalid user admin from 142.93.211.52 port 52022 ssh2
...
2020-01-20 22:33:04
93.188.204.42 attack
Jan 20 12:34:56 mailrelay sshd[31049]: Invalid user fieke from 93.188.204.42 port 60131
Jan 20 12:34:56 mailrelay sshd[31049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.188.204.42
Jan 20 12:34:59 mailrelay sshd[31049]: Failed password for invalid user fieke from 93.188.204.42 port 60131 ssh2
Jan 20 12:34:59 mailrelay sshd[31049]: Received disconnect from 93.188.204.42 port 60131:11: Bye Bye [preauth]
Jan 20 12:34:59 mailrelay sshd[31049]: Disconnected from 93.188.204.42 port 60131 [preauth]
Jan 20 13:10:40 mailrelay sshd[31369]: Connection closed by 93.188.204.42 port 48792 [preauth]
Jan 20 13:21:26 mailrelay sshd[31444]: Connection closed by 93.188.204.42 port 45828 [preauth]
Jan 20 13:32:08 mailrelay sshd[31527]: Connection closed by 93.188.204.42 port 42575 [preauth]
Jan 20 13:43:08 mailrelay sshd[31604]: Invalid user oper01 from 93.188.204.42 port 38997
Jan 20 13:43:08 mailrelay sshd[31604]: pam_unix(sshd:auth): authe........
-------------------------------
2020-01-20 22:36:14
59.188.30.116 attackspam
59.188.30.116 - - [20/Jan/2020:14:33:07 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
59.188.30.116 - - [20/Jan/2020:14:33:13 +0100] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
59.188.30.116 - - [20/Jan/2020:14:33:14 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
59.188.30.116 - - [20/Jan/2020:14:33:15 +0100] "POST /wp-login.php HTTP/1.1" 200 1710 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
59.188.30.116 - - [20/Jan/2020:14:33:16 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
59.188.30.116 - - [20/Jan/2020:14:33:22 +0100] "POST /wp-login.php HTTP/1.1" 200 1710 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-01-20 22:19:16
129.211.4.202 attack
Jan 20 07:17:00 askasleikir sshd[212925]: Failed password for root from 129.211.4.202 port 43354 ssh2
2020-01-20 22:38:23
180.158.212.107 attackbotsspam
Unauthorized connection attempt detected from IP address 180.158.212.107 to port 445 [T]
2020-01-20 22:55:55
103.90.227.164 attackspambots
Unauthorized connection attempt detected from IP address 103.90.227.164 to port 2220 [J]
2020-01-20 22:35:56
222.114.225.136 attackbots
Unauthorized connection attempt detected from IP address 222.114.225.136 to port 2220 [J]
2020-01-20 22:34:58
174.255.132.202 attack
I suspect this IP address is being used by my ex and associates.,aka fellow convicts, it is with Verizon which seems to be the carrier always used.
it was inconclusive on location, is that something you can assist with? 
Sincerely
Jeanie Smith 
8175834552
2020-01-20 22:49:13
188.126.76.32 attackspambots
15 attempts against mh-mag-login-ban on hill.magehost.pro
2020-01-20 22:18:05
122.51.198.248 attackspambots
Jan 20 16:19:24 server sshd\[2164\]: Invalid user teamspeak3 from 122.51.198.248
Jan 20 16:19:24 server sshd\[2164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.198.248 
Jan 20 16:19:26 server sshd\[2164\]: Failed password for invalid user teamspeak3 from 122.51.198.248 port 40474 ssh2
Jan 20 16:33:20 server sshd\[5734\]: Invalid user sbserver from 122.51.198.248
Jan 20 16:33:20 server sshd\[5734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.198.248 
...
2020-01-20 22:35:33
46.38.144.202 attackbots
Jan 20 15:40:44 relay postfix/smtpd\[25710\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 20 15:40:54 relay postfix/smtpd\[22982\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 20 15:41:32 relay postfix/smtpd\[23014\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 20 15:41:41 relay postfix/smtpd\[27825\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 20 15:42:21 relay postfix/smtpd\[23616\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-20 22:42:43
178.219.16.226 attackbotsspam
Jan 20 15:14:36 vpn01 sshd[24866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.219.16.226
Jan 20 15:14:38 vpn01 sshd[24866]: Failed password for invalid user write from 178.219.16.226 port 50242 ssh2
...
2020-01-20 22:15:56
54.38.242.233 attack
2020-01-20T13:01:34.171340abusebot-8.cloudsearch.cf sshd[2262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=233.ip-54-38-242.eu  user=root
2020-01-20T13:01:36.318329abusebot-8.cloudsearch.cf sshd[2262]: Failed password for root from 54.38.242.233 port 57206 ssh2
2020-01-20T13:04:07.619068abusebot-8.cloudsearch.cf sshd[2645]: Invalid user testi from 54.38.242.233 port 58222
2020-01-20T13:04:07.632382abusebot-8.cloudsearch.cf sshd[2645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=233.ip-54-38-242.eu
2020-01-20T13:04:07.619068abusebot-8.cloudsearch.cf sshd[2645]: Invalid user testi from 54.38.242.233 port 58222
2020-01-20T13:04:09.768675abusebot-8.cloudsearch.cf sshd[2645]: Failed password for invalid user testi from 54.38.242.233 port 58222 ssh2
2020-01-20T13:06:52.028150abusebot-8.cloudsearch.cf sshd[3004]: Invalid user testdev from 54.38.242.233 port 59240
...
2020-01-20 22:25:58
92.38.47.15 attack
[portscan] Port scan
2020-01-20 22:18:29
2.228.253.188 attackspambots
Unauthorised access (Jan 20) SRC=2.228.253.188 LEN=52 TTL=115 ID=20031 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-20 22:39:01

Recently Reported IPs

155.133.230.99 106.75.247.10 70.80.47.233 250.172.210.190
10.152.66.57 110.42.64.36 10.10.3.151 172.24.0.227
92.114.82.79 167.71.235.208 87.236.176.142 8.210.138.118
171.121.12.131 24.206.101.37 146.70.132.219 121.8.35.116
223.214.15.121 182.130.46.201 171.8.180.192 171.13.52.20