Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.148.20.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43660
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.148.20.45.			IN	A

;; AUTHORITY SECTION:
.			554	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061302 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 14 06:58:15 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 45.20.148.85.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.20.148.85.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.247.158.247 attack
Unauthorized connection attempt from IP address 187.247.158.247 on Port 445(SMB)
2020-09-24 03:01:04
113.131.182.68 attackspam
Auto Detect Rule!
proto TCP (SYN), 113.131.182.68:5779->gjan.info:23, len 40
2020-09-24 03:03:22
179.179.106.64 attackbots
Listed on    zen-spamhaus also barracudaCentral and abuseat.org   / proto=6  .  srcport=52165  .  dstport=23  .     (3049)
2020-09-24 03:11:15
217.79.181.35 attackspam
Automatic report - Port Scan Attack
2020-09-24 03:10:48
103.205.68.2 attackbots
Sep 23 16:29:41 sigma sshd\[1030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.68.2  user=rootSep 23 16:41:17 sigma sshd\[1205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.68.2
...
2020-09-24 02:53:38
178.62.241.56 attackspambots
" "
2020-09-24 03:11:38
59.20.154.52 attackbotsspam
24028/udp 5555/tcp
[2020-09-04/22]2pkt
2020-09-24 02:54:38
122.51.200.223 attack
Sep 22 09:04:11 roki-contabo sshd\[14909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.200.223  user=root
Sep 22 09:04:13 roki-contabo sshd\[14909\]: Failed password for root from 122.51.200.223 port 51628 ssh2
Sep 22 09:09:34 roki-contabo sshd\[14925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.200.223  user=root
Sep 22 09:09:37 roki-contabo sshd\[14925\]: Failed password for root from 122.51.200.223 port 57306 ssh2
Sep 22 09:14:27 roki-contabo sshd\[14973\]: Invalid user anna from 122.51.200.223
Sep 22 09:14:27 roki-contabo sshd\[14973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.200.223
...
2020-09-24 02:47:13
89.113.143.63 attackspam
Unauthorized connection attempt from IP address 89.113.143.63 on Port 445(SMB)
2020-09-24 03:09:27
112.85.42.227 attack
Sep 23 14:19:46 NPSTNNYC01T sshd[1026]: Failed password for root from 112.85.42.227 port 47409 ssh2
Sep 23 14:22:23 NPSTNNYC01T sshd[1330]: Failed password for root from 112.85.42.227 port 21159 ssh2
...
2020-09-24 02:42:11
41.251.254.98 attack
Sep 23 20:43:23 sip sshd[1707996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.251.254.98 
Sep 23 20:43:23 sip sshd[1707996]: Invalid user divya from 41.251.254.98 port 59406
Sep 23 20:43:24 sip sshd[1707996]: Failed password for invalid user divya from 41.251.254.98 port 59406 ssh2
...
2020-09-24 03:04:57
106.104.34.120 attack
Sep 21 21:09:28 roki-contabo sshd\[24047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.104.34.120  user=root
Sep 21 21:09:30 roki-contabo sshd\[24047\]: Failed password for root from 106.104.34.120 port 44148 ssh2
Sep 22 19:00:43 roki-contabo sshd\[20458\]: Invalid user admin from 106.104.34.120
Sep 22 19:00:43 roki-contabo sshd\[20458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.104.34.120
Sep 22 19:00:45 roki-contabo sshd\[20458\]: Failed password for invalid user admin from 106.104.34.120 port 44057 ssh2
...
2020-09-24 02:46:04
201.149.55.53 attack
firewall-block, port(s): 14455/tcp
2020-09-24 02:58:27
203.77.43.79 attack
1600794042 - 09/22/2020 19:00:42 Host: 203.77.43.79/203.77.43.79 Port: 445 TCP Blocked
2020-09-24 02:52:44
120.132.28.86 attackbotsspam
detected by Fail2Ban
2020-09-24 02:59:52

Recently Reported IPs

169.229.206.186 169.229.207.46 169.229.206.202 169.229.207.144
169.229.207.102 169.229.207.228 169.229.208.1 169.229.208.48
169.229.208.77 169.229.208.164 169.229.208.222 15.175.149.51
169.229.209.24 169.229.209.112 169.229.209.166 169.229.209.215
169.229.209.238 169.229.210.32 169.229.210.69 169.229.210.115