Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.85.52.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.85.52.12.			IN	A

;; AUTHORITY SECTION:
.			522	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061401 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 15 12:54:19 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 12.52.85.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.52.85.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.6.72.17 attackbotsspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-25 16:47:18
202.80.214.54 attackbotsspam
xmlrpc attack
2020-04-25 16:56:42
216.126.231.15 attackspambots
(sshd) Failed SSH login from 216.126.231.15 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 25 10:03:04 ubnt-55d23 sshd[23894]: Invalid user agenda from 216.126.231.15 port 46750
Apr 25 10:03:06 ubnt-55d23 sshd[23894]: Failed password for invalid user agenda from 216.126.231.15 port 46750 ssh2
2020-04-25 16:48:32
119.96.171.162 attack
Invalid user user3 from 119.96.171.162 port 38722
2020-04-25 16:11:18
106.13.29.200 attack
Invalid user nw from 106.13.29.200 port 34914
2020-04-25 16:25:44
107.180.227.163 attackspambots
Unauthorized connection attempt detected, IP banned.
2020-04-25 16:45:06
115.29.246.243 attackspam
Invalid user admin from 115.29.246.243 port 44723
2020-04-25 16:15:04
139.59.59.55 attackspam
$f2bV_matches
2020-04-25 16:51:07
35.199.73.233 attack
Invalid user ey from 35.199.73.233 port 59324
2020-04-25 16:52:22
104.168.248.155 attack
US - - [24/Apr/2020:19:09:50 +0300] POST /wp-login.php HTTP/1.1 200 4795 - Mozilla/5.0 X11; Ubuntu; Linux x86_64; rv:62.0 Gecko/20100101 Firefox/62.0
2020-04-25 16:46:39
72.45.150.226 attack
Invalid user postgres from 72.45.150.226 port 45846
2020-04-25 16:10:51
95.84.134.5 attackbotsspam
Apr 24 19:27:48 tdfoods sshd\[30668\]: Invalid user bash from 95.84.134.5
Apr 24 19:27:48 tdfoods sshd\[30668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-95-84-134-5.ip.moscow.rt.ru
Apr 24 19:27:49 tdfoods sshd\[30668\]: Failed password for invalid user bash from 95.84.134.5 port 48588 ssh2
Apr 24 19:31:26 tdfoods sshd\[30962\]: Invalid user te from 95.84.134.5
Apr 24 19:31:26 tdfoods sshd\[30962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-95-84-134-5.ip.moscow.rt.ru
2020-04-25 16:32:32
50.63.161.42 attack
MYH,DEF GET /wp-login.php
2020-04-25 16:22:46
176.123.6.48 attack
(sshd) Failed SSH login from 176.123.6.48 (MD/Republic of Moldova/init-in-dollarde.cnndy.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 25 07:30:19 amsweb01 sshd[16638]: Invalid user ubnt from 176.123.6.48 port 37354
Apr 25 07:30:21 amsweb01 sshd[16638]: Failed password for invalid user ubnt from 176.123.6.48 port 37354 ssh2
Apr 25 07:30:21 amsweb01 sshd[16640]: User admin from 176.123.6.48 not allowed because not listed in AllowUsers
Apr 25 07:30:21 amsweb01 sshd[16640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.123.6.48  user=admin
Apr 25 07:30:24 amsweb01 sshd[16640]: Failed password for invalid user admin from 176.123.6.48 port 39672 ssh2
2020-04-25 16:37:32
155.12.59.138 attack
Port probing on unauthorized port 8291
2020-04-25 16:28:40

Recently Reported IPs

49.85.52.229 49.82.26.178 78.42.69.82 78.46.162.123
78.46.195.46 174.85.242.61 78.47.56.133 78.63.2.120
57.91.83.119 78.61.252.47 49.85.50.23 49.85.50.3
49.85.52.138 49.85.51.168 49.85.49.204 49.85.52.201
49.85.51.240 49.85.50.115 49.85.54.213 49.85.75.243