Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.142.234.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47087
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.142.234.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 04:13:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 68.234.142.85.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.234.142.85.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.252.185.227 attackspam
2019-06-24 UTC: 2x - sansforensics,student
2019-06-25 14:24:09
178.128.79.169 attackbotsspam
Invalid user andrei from 178.128.79.169 port 40434
2019-06-25 14:37:53
68.183.150.54 attack
Jun 25 08:29:15 core01 sshd\[25901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.150.54  user=root
Jun 25 08:29:17 core01 sshd\[25901\]: Failed password for root from 68.183.150.54 port 40174 ssh2
...
2019-06-25 14:35:11
13.80.152.138 attackbotsspam
Invalid user oracle from 13.80.152.138 port 45930
2019-06-25 14:36:18
103.36.84.180 attackbots
Jun 25 05:02:51 cvbmail sshd\[30605\]: Invalid user spd from 103.36.84.180
Jun 25 05:02:51 cvbmail sshd\[30605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.84.180
Jun 25 05:02:53 cvbmail sshd\[30605\]: Failed password for invalid user spd from 103.36.84.180 port 54484 ssh2
2019-06-25 14:07:17
119.201.109.155 attack
Invalid user test from 119.201.109.155 port 47676
2019-06-25 14:43:57
150.95.110.67 attackbotsspam
Jun 25 03:37:03 lnxmysql61 sshd[28664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.110.67
Jun 25 03:37:03 lnxmysql61 sshd[28664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.110.67
2019-06-25 14:03:08
177.92.144.90 attack
Attempted SSH login
2019-06-25 14:01:19
180.250.115.121 attack
Jun 25 05:50:25 SilenceServices sshd[13639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.115.121
Jun 25 05:50:27 SilenceServices sshd[13639]: Failed password for invalid user connor from 180.250.115.121 port 39105 ssh2
Jun 25 05:52:12 SilenceServices sshd[14756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.115.121
2019-06-25 14:15:09
141.98.81.81 attackspambots
Invalid user admin from 141.98.81.81 port 41942
2019-06-25 14:29:51
177.236.189.27 attack
Autoban   177.236.189.27 AUTH/CONNECT
2019-06-25 14:38:29
182.252.0.188 attackbots
Invalid user server from 182.252.0.188 port 60231
2019-06-25 14:27:09
197.54.99.11 attackbotsspam
Invalid user admin from 197.54.99.11 port 54493
2019-06-25 14:37:28
106.12.90.234 attackspambots
Invalid user testuser from 106.12.90.234 port 59854
2019-06-25 14:33:08
2.38.90.101 attackspambots
Invalid user mt from 2.38.90.101 port 56782
2019-06-25 14:25:11

Recently Reported IPs

191.202.105.16 83.138.236.110 147.142.153.196 24.86.129.76
155.86.114.213 213.16.246.25 174.109.119.238 13.72.63.110
197.103.32.118 223.105.144.208 176.66.4.44 98.131.242.163
61.60.69.109 164.12.157.200 15.141.113.232 47.15.92.231
248.216.163.150 211.147.62.164 224.150.161.235 213.136.254.103