Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Trimbach

Region: Solothurn

Country: Switzerland

Internet Service Provider: Swisscom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.2.120.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.2.120.103.			IN	A

;; AUTHORITY SECTION:
.			174	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060200 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 02 21:39:26 CST 2024
;; MSG SIZE  rcvd: 105
Host info
103.120.2.85.in-addr.arpa domain name pointer 103.120.2.85.dynamic.wline.res.cust.swisscom.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
103.120.2.85.in-addr.arpa	name = 103.120.2.85.dynamic.wline.res.cust.swisscom.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
154.8.217.73 attackspam
2019-10-24T07:04:44.078885shield sshd\[20622\]: Invalid user paulo from 154.8.217.73 port 50644
2019-10-24T07:04:44.086857shield sshd\[20622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.217.73
2019-10-24T07:04:46.390628shield sshd\[20622\]: Failed password for invalid user paulo from 154.8.217.73 port 50644 ssh2
2019-10-24T07:10:50.421888shield sshd\[22004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.217.73  user=root
2019-10-24T07:10:52.304431shield sshd\[22004\]: Failed password for root from 154.8.217.73 port 57958 ssh2
2019-10-24 15:39:53
185.176.27.166 attack
10/24/2019-09:08:04.717353 185.176.27.166 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-24 15:33:28
180.126.232.107 attack
22/tcp 22/tcp 22/tcp
[2019-10-24]3pkt
2019-10-24 15:11:16
36.89.29.97 attack
23/tcp
[2019-10-24]1pkt
2019-10-24 15:05:55
82.102.216.157 attackbots
82.102.216.157 - - [24/Oct/2019:08:43:30 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.102.216.157 - - [24/Oct/2019:08:43:35 +0200] "POST /wp-login.php HTTP/1.1" 200 1524 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.102.216.157 - - [24/Oct/2019:08:43:41 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.102.216.157 - - [24/Oct/2019:08:43:46 +0200] "POST /wp-login.php HTTP/1.1" 200 1530 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.102.216.157 - - [24/Oct/2019:08:43:51 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.102.216.157 - - [24/Oct/2019:08:43:56 +0200] "POST /wp-login.php HTTP/1.1" 200 1526 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-10-24 15:41:52
66.240.236.119 attack
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-10-24 15:17:58
197.50.180.196 attackspam
23/tcp
[2019-10-24]1pkt
2019-10-24 15:24:39
117.2.123.95 attackspam
445/tcp
[2019-10-24]1pkt
2019-10-24 15:36:34
124.127.73.34 attack
UTC: 2019-10-23 port: 23/tcp
2019-10-24 15:34:02
159.203.139.128 attackbotsspam
2019-10-24T07:06:10.138829abusebot-5.cloudsearch.cf sshd\[16033\]: Invalid user 123thunder from 159.203.139.128 port 44000
2019-10-24 15:25:27
106.12.185.54 attackspambots
Oct 24 05:46:37 MK-Soft-VM6 sshd[3127]: Failed password for root from 106.12.185.54 port 36424 ssh2
...
2019-10-24 15:14:13
125.231.143.138 attackbots
23/tcp
[2019-10-24]1pkt
2019-10-24 15:42:29
185.209.0.92 attack
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-10-24 15:18:21
5.37.134.95 attackbotsspam
445/tcp
[2019-10-24]1pkt
2019-10-24 15:21:43
138.197.143.221 attackbots
Oct 24 09:01:23 v22018076622670303 sshd\[4384\]: Invalid user compnf from 138.197.143.221 port 57950
Oct 24 09:01:23 v22018076622670303 sshd\[4384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.143.221
Oct 24 09:01:25 v22018076622670303 sshd\[4384\]: Failed password for invalid user compnf from 138.197.143.221 port 57950 ssh2
...
2019-10-24 15:34:46

Recently Reported IPs

246.80.180.117 216.60.232.134 20.152.232.158 202.53.221.46
203.209.181.21 192.219.42.55 220.201.187.76 11.82.30.42
36.162.39.133 235.11.41.143 145.29.53.170 130.205.234.58
155.29.138.11 48.220.33.226 14.240.247.27 196.225.238.192
29.187.238.29 247.21.202.143 57.46.56.252 92.120.230.127