Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.231.85.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3142
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.231.85.68.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:58:44 CST 2025
;; MSG SIZE  rcvd: 105
Host info
68.85.231.45.in-addr.arpa domain name pointer 68-85-231-45.digitalsatinternet.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.85.231.45.in-addr.arpa	name = 68-85-231-45.digitalsatinternet.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.35.199.14 attack
Unauthorized connection attempt detected from IP address 58.35.199.14 to port 9673 [T]
2020-04-22 19:52:16
101.51.144.235 attack
Automatic report - SSH Brute-Force Attack
2020-04-22 19:34:12
51.178.50.244 attack
Apr 22 11:43:24 l03 sshd[19280]: Invalid user test3 from 51.178.50.244 port 49464
...
2020-04-22 19:44:11
164.68.110.24 attackspambots
$f2bV_matches
2020-04-22 19:28:35
178.62.99.47 attackbots
Port Scan
2020-04-22 19:17:34
14.228.34.62 attackspam
" "
2020-04-22 19:16:50
167.99.87.82 attackbots
Apr 22 12:47:22 mout sshd[23660]: Invalid user admin from 167.99.87.82 port 34498
2020-04-22 19:39:07
66.42.56.21 attackbots
66.42.56.21 - - \[22/Apr/2020:09:27:32 +0200\] "POST /wp-login.php HTTP/1.0" 200 6811 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
66.42.56.21 - - \[22/Apr/2020:09:27:35 +0200\] "POST /wp-login.php HTTP/1.0" 200 6809 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
66.42.56.21 - - \[22/Apr/2020:09:27:37 +0200\] "POST /wp-login.php HTTP/1.0" 200 6657 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-04-22 19:26:46
92.222.90.130 attack
SSH login attempts.
2020-04-22 19:18:51
195.224.138.61 attack
k+ssh-bruteforce
2020-04-22 19:38:53
209.17.96.82 attackbots
DDOS attempt blocked
2020-04-22 19:45:04
1.2.183.123 attackbotsspam
trying to access non-authorized port
2020-04-22 19:07:43
157.230.48.124 attackspambots
SSH login attempts.
2020-04-22 19:21:58
113.169.114.226 attackbotsspam
invalid login attempt (Administrator)
2020-04-22 19:48:29
180.101.248.148 attack
Apr 22 06:49:21 vpn01 sshd[3082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.248.148
Apr 22 06:49:23 vpn01 sshd[3082]: Failed password for invalid user iq from 180.101.248.148 port 35266 ssh2
...
2020-04-22 19:31:55

Recently Reported IPs

93.13.91.193 129.22.155.77 247.155.29.4 251.103.137.117
74.80.222.144 232.140.250.223 99.158.179.205 205.182.40.203
150.221.82.246 167.250.50.192 233.137.105.166 127.189.174.236
85.156.65.95 138.66.53.138 255.84.130.31 103.160.104.96
174.192.228.147 57.87.131.248 200.230.181.67 127.134.111.8