Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.239.57.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33678
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.239.57.12.			IN	A

;; AUTHORITY SECTION:
.			345	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 16:39:17 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 12.57.239.85.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 85.239.57.12.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
114.40.82.64 attack
Unauthorized connection attempt from IP address 114.40.82.64 on Port 445(SMB)
2020-04-20 01:13:30
158.69.249.177 attack
Found by fail2ban
2020-04-20 01:27:46
103.138.108.114 attackspambots
Unauthorized connection attempt from IP address 103.138.108.114 on Port 3389(RDP)
2020-04-20 01:21:44
200.89.154.99 attackspambots
Apr 19 16:16:39 localhost sshd\[13205\]: Invalid user postgres from 200.89.154.99 port 47453
Apr 19 16:16:39 localhost sshd\[13205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.154.99
Apr 19 16:16:41 localhost sshd\[13205\]: Failed password for invalid user postgres from 200.89.154.99 port 47453 ssh2
...
2020-04-20 01:27:27
52.156.152.50 attackbotsspam
2020-04-19T13:45:05.749553v22018076590370373 sshd[32481]: Invalid user ubuntu from 52.156.152.50 port 34044
2020-04-19T13:45:05.757200v22018076590370373 sshd[32481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.156.152.50
2020-04-19T13:45:05.749553v22018076590370373 sshd[32481]: Invalid user ubuntu from 52.156.152.50 port 34044
2020-04-19T13:45:08.263039v22018076590370373 sshd[32481]: Failed password for invalid user ubuntu from 52.156.152.50 port 34044 ssh2
2020-04-19T14:01:08.007042v22018076590370373 sshd[9969]: Invalid user wn from 52.156.152.50 port 57418
...
2020-04-20 00:58:34
138.68.106.62 attackspam
Apr 19 18:48:24 ift sshd\[4590\]: Invalid user postgres from 138.68.106.62Apr 19 18:48:26 ift sshd\[4590\]: Failed password for invalid user postgres from 138.68.106.62 port 36418 ssh2Apr 19 18:52:16 ift sshd\[5138\]: Invalid user test from 138.68.106.62Apr 19 18:52:18 ift sshd\[5138\]: Failed password for invalid user test from 138.68.106.62 port 54144 ssh2Apr 19 18:56:21 ift sshd\[5948\]: Invalid user ti from 138.68.106.62
...
2020-04-20 01:11:14
141.98.81.84 attack
Apr 19 14:13:44 firewall sshd[26805]: Invalid user admin from 141.98.81.84
Apr 19 14:13:45 firewall sshd[26805]: Failed password for invalid user admin from 141.98.81.84 port 44933 ssh2
Apr 19 14:14:18 firewall sshd[26828]: Invalid user Admin from 141.98.81.84
...
2020-04-20 01:25:21
14.161.31.159 attackspam
'IP reached maximum auth failures for a one day block'
2020-04-20 01:04:51
51.254.129.128 attackspam
Apr 17 03:19:38 lock-38 sshd[1104347]: Failed password for invalid user oy from 51.254.129.128 port 47744 ssh2
Apr 17 03:26:42 lock-38 sshd[1104596]: Failed password for root from 51.254.129.128 port 41249 ssh2
Apr 17 03:30:25 lock-38 sshd[1104739]: Invalid user hv from 51.254.129.128 port 44270
Apr 17 03:30:25 lock-38 sshd[1104739]: Invalid user hv from 51.254.129.128 port 44270
Apr 17 03:30:25 lock-38 sshd[1104739]: Failed password for invalid user hv from 51.254.129.128 port 44270 ssh2
...
2020-04-20 01:12:00
41.249.250.209 attackbots
Apr 19 16:06:06 legacy sshd[8364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.249.250.209
Apr 19 16:06:08 legacy sshd[8364]: Failed password for invalid user vr from 41.249.250.209 port 37098 ssh2
Apr 19 16:10:44 legacy sshd[8392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.249.250.209
...
2020-04-20 01:21:58
139.255.19.250 attack
Unauthorized connection attempt from IP address 139.255.19.250 on Port 445(SMB)
2020-04-20 01:10:39
121.162.131.223 attackbots
Apr 19 21:58:20 gw1 sshd[23199]: Failed password for root from 121.162.131.223 port 45406 ssh2
...
2020-04-20 01:35:19
87.251.74.13 attackspambots
RU_ru-avm-1-mnt_<177>1587307979 [1:2403454:56800] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 78 [Classification: Misc Attack] [Priority: 2]:  {TCP} 87.251.74.13:55415
2020-04-20 00:57:22
116.237.76.200 attack
Apr 19 14:08:25 vpn01 sshd[29112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.237.76.200
Apr 19 14:08:27 vpn01 sshd[29112]: Failed password for invalid user postgres from 116.237.76.200 port 52208 ssh2
...
2020-04-20 01:01:36
194.31.244.38 attackbotsspam
Port scan on 6 port(s): 2018 2027 2028 2035 2041 2049
2020-04-20 01:02:35

Recently Reported IPs

101.88.1.132 113.183.213.220 217.130.82.9 119.166.40.74
103.87.170.237 47.243.71.51 182.120.55.123 106.12.77.23
154.244.186.241 41.237.226.108 103.158.104.196 103.87.170.117
124.190.83.152 202.56.238.9 117.198.172.246 189.155.248.21
37.6.103.31 103.228.250.170 102.249.4.129 128.78.137.105