Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.138.134.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11879
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.138.134.90.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021201 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 05:09:08 CST 2025
;; MSG SIZE  rcvd: 106
Host info
90.134.138.85.in-addr.arpa domain name pointer a85-138-134-90.cpe.netcabo.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
90.134.138.85.in-addr.arpa	name = a85-138-134-90.cpe.netcabo.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
101.109.156.14 attackspam
Port probing on unauthorized port 445
2020-08-11 17:40:14
122.228.19.80 attackspambots
proto=tcp  .  spt=62772  .  dpt=995  .  src=122.228.19.80  .  dst=xx.xx.4.1  .     Listed on    zen-spamhaus also abuseat-org     (42)
2020-08-11 17:52:54
49.88.112.111 attackbots
[MK-VM3] SSH login failed
2020-08-11 17:44:05
89.248.162.247 attack
[H1.VM8] Blocked by UFW
2020-08-11 17:48:20
193.112.70.95 attackspambots
Aug 11 07:30:53 vps639187 sshd\[1863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.70.95  user=root
Aug 11 07:30:55 vps639187 sshd\[1863\]: Failed password for root from 193.112.70.95 port 49428 ssh2
Aug 11 07:33:56 vps639187 sshd\[1941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.70.95  user=root
...
2020-08-11 18:12:34
103.107.187.252 attackspam
Aug  8 01:42:50 Ubuntu-1404-trusty-64-minimal sshd\[20189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.107.187.252  user=root
Aug  8 01:42:53 Ubuntu-1404-trusty-64-minimal sshd\[20189\]: Failed password for root from 103.107.187.252 port 52762 ssh2
Aug  8 01:48:46 Ubuntu-1404-trusty-64-minimal sshd\[22325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.107.187.252  user=root
Aug  8 01:48:48 Ubuntu-1404-trusty-64-minimal sshd\[22325\]: Failed password for root from 103.107.187.252 port 46436 ssh2
Aug  8 01:52:26 Ubuntu-1404-trusty-64-minimal sshd\[24615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.107.187.252  user=root
2020-08-11 17:49:13
120.92.151.17 attackspam
"fail2ban match"
2020-08-11 18:16:32
94.79.57.171 attackbots
20/8/10@23:49:37: FAIL: Alarm-Network address from=94.79.57.171
...
2020-08-11 18:15:38
185.63.253.239 spambotsattackproxynormal
185 63 253 200
2020-08-11 18:01:35
202.168.205.181 attack
Aug 11 07:29:53 electroncash sshd[29153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.168.205.181 
Aug 11 07:29:53 electroncash sshd[29153]: Invalid user ss@word77 from 202.168.205.181 port 26074
Aug 11 07:29:55 electroncash sshd[29153]: Failed password for invalid user ss@word77 from 202.168.205.181 port 26074 ssh2
Aug 11 07:33:10 electroncash sshd[29992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.168.205.181  user=root
Aug 11 07:33:11 electroncash sshd[29992]: Failed password for root from 202.168.205.181 port 25169 ssh2
...
2020-08-11 17:53:45
106.13.98.132 attackspambots
k+ssh-bruteforce
2020-08-11 18:07:16
79.104.58.62 attackspam
Aug 10 11:11:03 Ubuntu-1404-trusty-64-minimal sshd\[12342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.104.58.62  user=root
Aug 10 11:11:04 Ubuntu-1404-trusty-64-minimal sshd\[12342\]: Failed password for root from 79.104.58.62 port 46078 ssh2
Aug 10 11:21:18 Ubuntu-1404-trusty-64-minimal sshd\[18670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.104.58.62  user=root
Aug 10 11:21:19 Ubuntu-1404-trusty-64-minimal sshd\[18670\]: Failed password for root from 79.104.58.62 port 43062 ssh2
Aug 10 11:25:19 Ubuntu-1404-trusty-64-minimal sshd\[21330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.104.58.62  user=root
2020-08-11 18:10:49
203.162.54.246 attackbotsspam
SSH
2020-08-11 18:13:44
183.111.96.20 attackspam
Aug 11 08:10:08 mout sshd[14385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.96.20  user=root
Aug 11 08:10:10 mout sshd[14385]: Failed password for root from 183.111.96.20 port 41134 ssh2
2020-08-11 18:14:06
45.55.156.19 attackspam
Brute-force attempt banned
2020-08-11 17:46:47

Recently Reported IPs

13.207.97.56 154.30.249.134 12.121.115.202 149.92.212.225
47.241.62.164 50.20.72.74 191.77.94.163 240.222.120.60
12.180.146.159 29.222.75.251 255.140.153.158 65.186.216.183
82.73.102.139 15.71.119.116 250.57.201.254 138.207.102.170
32.86.253.0 43.62.46.207 198.5.68.38 22.86.230.21