Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.85.52.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.85.52.12.			IN	A

;; AUTHORITY SECTION:
.			522	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061401 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 15 12:54:19 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 12.52.85.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.52.85.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.82.68.218 attackspambots
Attempted connection to port 3389.
2020-09-03 07:40:07
60.32.147.217 attackbotsspam
Unauthorized connection attempt from IP address 60.32.147.217 on Port 445(SMB)
2020-09-03 07:24:12
190.184.201.99 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-03 07:52:23
37.187.171.22 attackbots
Attempted connection to port 14442.
2020-09-03 07:49:44
157.46.121.30 attackspam
Unauthorized connection attempt from IP address 157.46.121.30 on Port 445(SMB)
2020-09-03 07:22:43
189.112.123.157 attackbots
Unauthorized connection attempt from IP address 189.112.123.157 on Port 445(SMB)
2020-09-03 07:18:57
112.85.42.73 attack
Sep  3 01:10:01 vps647732 sshd[7411]: Failed password for root from 112.85.42.73 port 51615 ssh2
...
2020-09-03 07:20:19
103.43.185.142 attack
Sep  2 09:42:25 pixelmemory sshd[3120281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.43.185.142  user=root
Sep  2 09:42:27 pixelmemory sshd[3120281]: Failed password for root from 103.43.185.142 port 40104 ssh2
Sep  2 09:44:09 pixelmemory sshd[3121036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.43.185.142  user=root
Sep  2 09:44:12 pixelmemory sshd[3121036]: Failed password for root from 103.43.185.142 port 59222 ssh2
Sep  2 09:45:53 pixelmemory sshd[3142876]: Invalid user lra from 103.43.185.142 port 50118
...
2020-09-03 07:32:40
196.179.232.130 attack
Unauthorized connection attempt from IP address 196.179.232.130 on Port 445(SMB)
2020-09-03 07:25:28
46.239.55.187 attackbotsspam
Attempted connection to port 445.
2020-09-03 07:46:52
192.144.143.101 attackbotsspam
SSH Brute-Force. Ports scanning.
2020-09-03 07:51:57
177.41.92.48 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-03 07:26:50
45.164.236.97 attackspambots
Attempted connection to port 445.
2020-09-03 07:48:19
81.4.127.228 attackspambots
Sep  3 01:23:59 lnxded63 sshd[19242]: Failed password for root from 81.4.127.228 port 45230 ssh2
Sep  3 01:23:59 lnxded63 sshd[19242]: Failed password for root from 81.4.127.228 port 45230 ssh2
2020-09-03 07:35:03
103.151.184.14 attackspambots
Unauthorized connection attempt from IP address 103.151.184.14 on Port 445(SMB)
2020-09-03 07:49:02

Recently Reported IPs

49.85.52.229 49.82.26.178 78.42.69.82 78.46.162.123
78.46.195.46 174.85.242.61 78.47.56.133 78.63.2.120
57.91.83.119 78.61.252.47 49.85.50.23 49.85.50.3
49.85.52.138 49.85.51.168 49.85.49.204 49.85.52.201
49.85.51.240 49.85.50.115 49.85.54.213 49.85.75.243