Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.241.45.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6915
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.241.45.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 06:50:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
29.45.241.85.in-addr.arpa domain name pointer bl8-45-29.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
29.45.241.85.in-addr.arpa	name = bl8-45-29.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
82.64.255.146 attack
(sshd) Failed SSH login from 82.64.255.146 (FR/France/82-64-255-146.subs.proxad.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 21 05:24:05 amsweb01 sshd[2402]: Invalid user centos from 82.64.255.146 port 58348
Feb 21 05:24:06 amsweb01 sshd[2402]: Failed password for invalid user centos from 82.64.255.146 port 58348 ssh2
Feb 21 05:40:12 amsweb01 sshd[3472]: Invalid user user from 82.64.255.146 port 58808
Feb 21 05:40:14 amsweb01 sshd[3472]: Failed password for invalid user user from 82.64.255.146 port 58808 ssh2
Feb 21 05:58:09 amsweb01 sshd[4932]: Invalid user liangmm from 82.64.255.146 port 59252
2020-02-21 14:04:17
222.186.190.2 attackbots
Feb 21 02:33:04 firewall sshd[17074]: Failed password for root from 222.186.190.2 port 54120 ssh2
Feb 21 02:33:07 firewall sshd[17074]: Failed password for root from 222.186.190.2 port 54120 ssh2
Feb 21 02:33:11 firewall sshd[17074]: Failed password for root from 222.186.190.2 port 54120 ssh2
...
2020-02-21 13:35:06
51.68.124.181 attack
Feb 21 01:58:47 ws24vmsma01 sshd[231662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.124.181
Feb 21 01:58:48 ws24vmsma01 sshd[231662]: Failed password for invalid user pai from 51.68.124.181 port 49360 ssh2
...
2020-02-21 13:38:30
51.91.77.104 attack
Feb 20 19:41:27 hpm sshd\[22690\]: Invalid user test_dw from 51.91.77.104
Feb 20 19:41:27 hpm sshd\[22690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.ip-51-91-77.eu
Feb 20 19:41:29 hpm sshd\[22690\]: Failed password for invalid user test_dw from 51.91.77.104 port 55250 ssh2
Feb 20 19:44:31 hpm sshd\[22986\]: Invalid user speech-dispatcher from 51.91.77.104
Feb 20 19:44:31 hpm sshd\[22986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.ip-51-91-77.eu
2020-02-21 13:50:11
95.88.128.23 attackbots
2020-02-21T06:32:20.929795  sshd[5964]: Invalid user hammad from 95.88.128.23 port 59055
2020-02-21T06:32:20.942407  sshd[5964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.88.128.23
2020-02-21T06:32:20.929795  sshd[5964]: Invalid user hammad from 95.88.128.23 port 59055
2020-02-21T06:32:22.975605  sshd[5964]: Failed password for invalid user hammad from 95.88.128.23 port 59055 ssh2
...
2020-02-21 13:37:30
222.186.175.182 attack
Feb 21 06:39:13 vps647732 sshd[5492]: Failed password for root from 222.186.175.182 port 50542 ssh2
Feb 21 06:39:28 vps647732 sshd[5492]: error: maximum authentication attempts exceeded for root from 222.186.175.182 port 50542 ssh2 [preauth]
...
2020-02-21 13:44:55
185.209.0.51 attackspambots
Feb 21 06:34:44 debian-2gb-nbg1-2 kernel: \[4522493.186916\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.209.0.51 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=25963 PROTO=TCP SPT=51060 DPT=5010 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-21 13:39:53
18.225.30.147 attackspambots
Automatic report - XMLRPC Attack
2020-02-21 13:26:52
125.142.251.211 attackspambots
Feb 21 07:37:10 www sshd\[223960\]: Invalid user cpanelconnecttrack from 125.142.251.211
Feb 21 07:37:10 www sshd\[223960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.142.251.211
Feb 21 07:37:12 www sshd\[223960\]: Failed password for invalid user cpanelconnecttrack from 125.142.251.211 port 33564 ssh2
...
2020-02-21 14:04:02
183.83.144.168 attack
1582261095 - 02/21/2020 05:58:15 Host: 183.83.144.168/183.83.144.168 Port: 445 TCP Blocked
2020-02-21 14:01:12
154.209.66.15 attackspam
firewall-block, port(s): 11211/tcp
2020-02-21 13:57:54
176.28.206.95 attackbotsspam
Repeated RDP login failures. Last user: Carlos
2020-02-21 13:56:38
144.22.98.225 attackbots
Feb 20 19:27:29 php1 sshd\[8961\]: Invalid user cpanel from 144.22.98.225
Feb 20 19:27:29 php1 sshd\[8961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.98.225
Feb 20 19:27:31 php1 sshd\[8961\]: Failed password for invalid user cpanel from 144.22.98.225 port 52784 ssh2
Feb 20 19:31:37 php1 sshd\[9366\]: Invalid user cpanelrrdtool from 144.22.98.225
Feb 20 19:31:37 php1 sshd\[9366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.98.225
2020-02-21 13:44:28
142.93.195.189 attack
Feb 21 11:12:04 areeb-Workstation sshd[2006]: Failed password for postgres from 142.93.195.189 port 39996 ssh2
...
2020-02-21 14:01:56
218.92.0.192 attack
02/21/2020-00:51:08.882113 218.92.0.192 Protocol: 6 ET SCAN Potential SSH Scan
2020-02-21 13:53:45

Recently Reported IPs

129.45.54.12 201.240.4.100 163.209.126.204 127.138.36.176
6.92.156.65 6.245.66.214 31.95.178.204 203.121.7.171
20.29.223.244 139.194.4.55 220.172.125.153 104.239.119.222
128.71.16.137 57.252.81.149 170.37.196.80 141.123.203.0
167.74.79.247 73.97.210.1 132.167.218.194 177.148.20.99