Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.85.85.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10280
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.85.85.113.			IN	A

;; AUTHORITY SECTION:
.			232	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061401 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 15 13:06:20 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 113.85.85.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.85.85.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.254.65.152 attackbots
Unauthorized connection attempt from IP address 14.254.65.152 on Port 445(SMB)
2020-03-28 02:28:44
106.13.189.158 attackspambots
Invalid user ftpd from 106.13.189.158 port 54169
2020-03-28 02:36:12
106.12.57.149 attackbotsspam
Invalid user nakajima from 106.12.57.149 port 59628
2020-03-28 02:32:43
49.37.136.191 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-03-2020 12:30:13.
2020-03-28 01:59:43
129.211.22.160 attackspambots
Mar 27 18:47:35 sso sshd[22099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.22.160
Mar 27 18:47:37 sso sshd[22099]: Failed password for invalid user pu from 129.211.22.160 port 46954 ssh2
...
2020-03-28 02:35:17
128.199.95.60 attack
2020-03-27T17:36:51.666492abusebot-6.cloudsearch.cf sshd[15171]: Invalid user jdc from 128.199.95.60 port 52544
2020-03-27T17:36:51.673698abusebot-6.cloudsearch.cf sshd[15171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60
2020-03-27T17:36:51.666492abusebot-6.cloudsearch.cf sshd[15171]: Invalid user jdc from 128.199.95.60 port 52544
2020-03-27T17:36:53.380989abusebot-6.cloudsearch.cf sshd[15171]: Failed password for invalid user jdc from 128.199.95.60 port 52544 ssh2
2020-03-27T17:43:22.961298abusebot-6.cloudsearch.cf sshd[15594]: Invalid user rails from 128.199.95.60 port 40614
2020-03-27T17:43:22.969836abusebot-6.cloudsearch.cf sshd[15594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60
2020-03-27T17:43:22.961298abusebot-6.cloudsearch.cf sshd[15594]: Invalid user rails from 128.199.95.60 port 40614
2020-03-27T17:43:25.358963abusebot-6.cloudsearch.cf sshd[15594]: Failed passw
...
2020-03-28 02:07:27
194.152.12.121 attackbots
Invalid user pi from 194.152.12.121 port 47386
2020-03-28 02:03:44
92.63.194.108 attackspambots
2020-03-27T18:34:37.099978  sshd[9532]: Invalid user admin from 92.63.194.108 port 37965
2020-03-27T18:34:37.109686  sshd[9532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.108
2020-03-27T18:34:37.099978  sshd[9532]: Invalid user admin from 92.63.194.108 port 37965
2020-03-27T18:34:39.088188  sshd[9532]: Failed password for invalid user admin from 92.63.194.108 port 37965 ssh2
...
2020-03-28 01:58:27
173.255.249.78 attackspambots
7657/tcp
[2020-03-27]1pkt
2020-03-28 02:00:44
51.159.28.242 attackspambots
" "
2020-03-28 02:37:04
154.16.202.212 attack
(smtpauth) Failed SMTP AUTH login from 154.16.202.212 (DE/Germany/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-03-27 19:56:34 login authenticator failed for (ADMIN) [154.16.202.212]: 535 Incorrect authentication data (set_id=info@taninsanat.com)
2020-03-28 02:29:50
92.63.194.107 attackspam
Fail2Ban Ban Triggered (2)
2020-03-28 01:58:57
106.12.48.226 attack
DATE:2020-03-27 19:36:05, IP:106.12.48.226, PORT:ssh SSH brute force auth (docker-dc)
2020-03-28 02:39:33
65.60.150.116 attackbots
Mar 27 16:55:47 localhost sshd\[10590\]: Invalid user patrat from 65.60.150.116 port 45754
Mar 27 16:55:47 localhost sshd\[10590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.60.150.116
Mar 27 16:55:49 localhost sshd\[10590\]: Failed password for invalid user patrat from 65.60.150.116 port 45754 ssh2
...
2020-03-28 02:33:45
209.17.97.98 attack
The IP has triggered Cloudflare WAF. CF-Ray: 57a607da7dbeb8db | WAF_Rule_ID: ipr24 | WAF_Kind: firewall | CF_Action: challenge | Country: US | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: notes.skk.moe | User-Agent: Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2; http://cloudsystemnetworks.com) | CF_DC: MIA. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-03-28 02:13:10

Recently Reported IPs

45.57.242.182 49.85.97.171 37.146.210.238 23.248.219.158
45.57.184.59 157.54.63.68 49.85.98.232 45.57.184.106
45.57.184.78 108.36.162.227 45.57.184.162 117.20.214.9
45.57.184.250 45.57.192.48 101.34.16.75 186.0.206.51
34.93.122.208 23.236.236.165 149.156.44.1 49.145.102.180