Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.149.48.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.149.48.20.			IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020110301 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 04 17:39:54 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 20.48.149.85.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.48.149.85.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.169.36.91 attackbotsspam
imap. Password mismatch
2019-06-26 05:33:08
119.147.152.111 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-04-29/06-25]12pkt,1pt.(tcp)
2019-06-26 05:28:01
198.199.109.250 attack
jannisjulius.de 198.199.109.250 \[25/Jun/2019:19:16:44 +0200\] "POST /wp-login.php HTTP/1.1" 200 6117 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
jannisjulius.de 198.199.109.250 \[25/Jun/2019:19:16:45 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4090 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-06-26 04:53:53
37.61.223.179 attack
Automatic report - Web App Attack
2019-06-26 04:56:35
182.106.216.4 attack
imap. Unknown user
2019-06-26 05:32:10
59.49.233.24 attackbots
imap. Password mismatch
2019-06-26 05:04:11
212.156.98.210 attack
Unauthorized connection attempt from IP address 212.156.98.210 on Port 445(SMB)
2019-06-26 05:15:21
187.1.21.234 attackbotsspam
libpam_shield report: forced login attempt
2019-06-26 05:04:29
84.217.93.92 attackspam
MYH,DEF GET /wp-login.php
2019-06-26 04:57:09
2.139.209.78 attack
SSH Brute Force
2019-06-26 04:50:36
218.204.138.137 attack
imap. Unknown user
2019-06-26 05:05:51
179.53.121.215 attackbots
Unauthorized connection attempt from IP address 179.53.121.215 on Port 445(SMB)
2019-06-26 05:29:50
94.74.148.85 attack
imap. Unknown user
2019-06-26 05:23:25
187.94.80.229 attackspam
imap. Unknown user
2019-06-26 05:08:34
123.16.53.111 attackspambots
445/tcp 445/tcp 445/tcp
[2019-05-17/06-25]3pkt
2019-06-26 05:17:16

Recently Reported IPs

167.71.234.128 103.87.136.217 51.36.21.207 194.116.193.51
193.227.30.10 129.146.115.58 212.90.161.250 187.85.170.41
45.250.246.9 123.207.107.83 94.176.242.239 217.240.237.137
92.96.57.164 45.146.165.160 52.112.14.233 34.75.21.143
17.58.102.21 147.147.220.101 159.65.210.36 161.129.70.213