Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lilienthal

Region: Lower Saxony

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.16.43.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57364
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.16.43.145.			IN	A

;; AUTHORITY SECTION:
.			268	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021103001 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 31 05:25:08 CST 2021
;; MSG SIZE  rcvd: 105
Host info
145.43.16.85.in-addr.arpa domain name pointer dyndsl-085-016-043-145.ewe-ip-backbone.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.43.16.85.in-addr.arpa	name = dyndsl-085-016-043-145.ewe-ip-backbone.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
62.234.2.59 attack
2020-07-18T17:58:19.300228shield sshd\[28368\]: Invalid user alice from 62.234.2.59 port 57010
2020-07-18T17:58:19.308777shield sshd\[28368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.2.59
2020-07-18T17:58:21.490112shield sshd\[28368\]: Failed password for invalid user alice from 62.234.2.59 port 57010 ssh2
2020-07-18T18:00:49.414810shield sshd\[28979\]: Invalid user xz from 62.234.2.59 port 59102
2020-07-18T18:00:49.434241shield sshd\[28979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.2.59
2020-07-19 02:05:35
59.46.169.194 attackbots
Invalid user smx from 59.46.169.194 port 43940
2020-07-19 02:06:22
51.75.64.187 attackbots
(mod_security) mod_security (id:949110) triggered by 51.75.64.187 (FR/France/relay4.tor.ian.sh): 10 in the last 3600 secs; ID: DAN
2020-07-19 02:06:45
162.196.204.142 attack
Invalid user tttserver from 162.196.204.142 port 48422
2020-07-19 02:20:57
36.250.129.172 attack
Invalid user admin from 36.250.129.172 port 51402
2020-07-19 02:09:24
103.114.107.209 attack
Invalid user support from 103.114.107.209 port 49961
2020-07-19 02:32:32
106.75.119.202 attackspambots
Invalid user lauca from 106.75.119.202 port 37973
2020-07-19 02:30:51
104.129.194.243 attack
$f2bV_matches
2020-07-19 02:32:15
139.59.241.75 attackbots
Jul 18 20:14:06 buvik sshd[19119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.241.75
Jul 18 20:14:08 buvik sshd[19119]: Failed password for invalid user cym from 139.59.241.75 port 41629 ssh2
Jul 18 20:19:05 buvik sshd[19851]: Invalid user www from 139.59.241.75
...
2020-07-19 02:24:01
18.18.248.17 attackspambots
Time:     Sat Jul 18 09:56:20 2020 -0300
IP:       18.18.248.17 (US/United States/onions.mit.edu)
Failures: 5 (mod_security)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-07-19 02:41:02
145.239.85.168 attackbotsspam
Invalid user test from 145.239.85.168 port 56488
2020-07-19 02:22:57
187.144.185.170 attackspambots
Invalid user user1 from 187.144.185.170 port 19351
2020-07-19 02:17:11
220.161.81.131 attackspambots
Invalid user noah from 220.161.81.131 port 57990
2020-07-19 02:12:56
101.91.226.66 attackspambots
Invalid user mtb from 101.91.226.66 port 52060
2020-07-19 02:03:31
115.159.93.67 attack
Unauthorized connection attempt detected from IP address 115.159.93.67 to port 3787
2020-07-19 02:28:39

Recently Reported IPs

10.224.252.104 45.234.1.200 171.49.160.212 171.49.1.212
223.206.217.170 24.177.138.221 178.86.51.161 178.86.51.160
134.224.243.189 150.242.172.70 95.82.118.94 110.232.172.40
111.232.172.40 150.242.172.204 180.242.172.204 131.242.172.203
150.242.172.209 124.94.255.139 116.113.12.188 36.5.197.4